2017-12-15 00:29:38 +01:00
|
|
|
|
#!/usr/bin/env python3
|
|
|
|
|
|
2017-12-19 22:51:03 +01:00
|
|
|
|
import glob
|
|
|
|
|
import inspect
|
|
|
|
|
import logging
|
2017-12-15 00:29:38 +01:00
|
|
|
|
import optparse
|
2017-12-19 22:51:03 +01:00
|
|
|
|
import os
|
2022-04-21 21:49:08 +02:00
|
|
|
|
import re
|
2020-06-03 16:55:43 +02:00
|
|
|
|
import shutil
|
2017-12-19 22:51:03 +01:00
|
|
|
|
import sys
|
2020-05-14 16:08:56 +02:00
|
|
|
|
import tempfile
|
|
|
|
|
import textwrap
|
2017-12-19 22:51:03 +01:00
|
|
|
|
import unittest
|
2020-06-03 16:55:43 +02:00
|
|
|
|
import uuid
|
2020-06-03 23:40:01 +02:00
|
|
|
|
import yaml
|
2022-09-29 17:21:03 +02:00
|
|
|
|
import zipfile
|
2022-07-17 15:52:52 +02:00
|
|
|
|
import collections
|
|
|
|
|
import pathlib
|
2020-05-14 16:08:56 +02:00
|
|
|
|
from unittest import mock
|
2022-09-22 01:33:23 +02:00
|
|
|
|
from datetime import datetime, timedelta
|
2017-12-19 22:51:03 +01:00
|
|
|
|
|
|
|
|
|
localmodule = os.path.realpath(
|
2021-06-07 11:49:21 +02:00
|
|
|
|
os.path.join(os.path.dirname(inspect.getfile(inspect.currentframe())), '..')
|
|
|
|
|
)
|
2017-12-19 22:51:03 +01:00
|
|
|
|
print('localmodule: ' + localmodule)
|
|
|
|
|
if localmodule not in sys.path:
|
|
|
|
|
sys.path.insert(0, localmodule)
|
2017-12-15 00:29:38 +01:00
|
|
|
|
|
2020-05-14 16:08:56 +02:00
|
|
|
|
import fdroidserver.build
|
2017-12-15 00:29:38 +01:00
|
|
|
|
import fdroidserver.common
|
2017-12-19 22:51:03 +01:00
|
|
|
|
import fdroidserver.metadata
|
|
|
|
|
import fdroidserver.scanner
|
2022-09-28 17:35:31 +02:00
|
|
|
|
from testcommon import TmpCwd, mock_open_to_str
|
2017-12-15 00:29:38 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class ScannerTest(unittest.TestCase):
|
2017-12-19 22:51:03 +01:00
|
|
|
|
def setUp(self):
|
|
|
|
|
logging.basicConfig(level=logging.INFO)
|
|
|
|
|
self.basedir = os.path.join(localmodule, 'tests')
|
2020-05-14 16:08:56 +02:00
|
|
|
|
self.tmpdir = os.path.abspath(os.path.join(self.basedir, '..', '.testfiles'))
|
|
|
|
|
if not os.path.exists(self.tmpdir):
|
|
|
|
|
os.makedirs(self.tmpdir)
|
|
|
|
|
os.chdir(self.basedir)
|
2017-12-19 22:51:03 +01:00
|
|
|
|
|
2017-12-15 00:29:38 +01:00
|
|
|
|
def test_scan_source_files(self):
|
2020-06-03 18:34:26 +02:00
|
|
|
|
fdroidserver.scanner.options = mock.Mock()
|
2020-05-14 16:08:56 +02:00
|
|
|
|
fdroidserver.scanner.options.json = False
|
2017-12-19 22:51:03 +01:00
|
|
|
|
source_files = os.path.join(self.basedir, 'source-files')
|
2017-12-15 00:29:38 +01:00
|
|
|
|
projects = {
|
2022-09-14 17:02:37 +02:00
|
|
|
|
'OtakuWorld': 2,
|
|
|
|
|
'Zillode': 1,
|
2020-01-31 23:49:50 +01:00
|
|
|
|
'cn.wildfirechat.chat': 4,
|
2022-09-14 17:02:37 +02:00
|
|
|
|
'com.github.shadowsocks': 6,
|
2020-02-03 21:13:26 +01:00
|
|
|
|
'com.integreight.onesheeld': 11,
|
2022-09-14 17:02:37 +02:00
|
|
|
|
'com.jens.automation2': 2,
|
2019-10-23 12:23:37 +02:00
|
|
|
|
'firebase-suspect': 1,
|
2022-09-30 05:36:36 +02:00
|
|
|
|
'org.mozilla.rocket': 1,
|
|
|
|
|
'org.tasks': 2,
|
2019-10-23 12:23:37 +02:00
|
|
|
|
'realm': 1,
|
2020-02-13 10:22:24 +01:00
|
|
|
|
'se.manyver': 2,
|
2017-12-15 00:29:38 +01:00
|
|
|
|
}
|
2017-12-19 22:51:03 +01:00
|
|
|
|
for d in glob.glob(os.path.join(source_files, '*')):
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
fatal_problems = fdroidserver.scanner.scan_source(d, build)
|
2019-10-23 12:23:37 +02:00
|
|
|
|
should = projects.get(os.path.basename(d), 0)
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
should, fatal_problems, "%s should have %d errors!" % (d, should)
|
|
|
|
|
)
|
2017-12-15 00:29:38 +01:00
|
|
|
|
|
2020-05-27 22:03:23 +02:00
|
|
|
|
def test_get_gradle_compile_commands(self):
|
|
|
|
|
test_files = [
|
2022-08-09 17:04:30 +02:00
|
|
|
|
('source-files/fdroid/fdroidclient/build.gradle', 'yes', 18),
|
|
|
|
|
('source-files/com.nextcloud.client/build.gradle', 'generic', 28),
|
2020-05-27 22:03:23 +02:00
|
|
|
|
('source-files/com.kunzisoft.testcase/build.gradle', 'libre', 4),
|
|
|
|
|
('source-files/cn.wildfirechat.chat/chat/build.gradle', 'yes', 33),
|
|
|
|
|
('source-files/org.tasks/app/build.gradle.kts', 'generic', 39),
|
|
|
|
|
('source-files/at.bitfire.davdroid/build.gradle', 'standard', 16),
|
|
|
|
|
('source-files/se.manyver/android/app/build.gradle', 'indie', 29),
|
|
|
|
|
('source-files/osmandapp/osmand/build.gradle', 'free', 5),
|
2022-08-09 17:04:30 +02:00
|
|
|
|
('source-files/eu.siacs.conversations/build.gradle', 'free', 24),
|
2020-05-27 22:03:23 +02:00
|
|
|
|
('source-files/org.mozilla.rocket/app/build.gradle', 'focus', 42),
|
2021-03-09 21:45:18 +01:00
|
|
|
|
('source-files/com.jens.automation2/app/build.gradle', 'fdroidFlavor', 8),
|
2020-05-27 22:03:23 +02:00
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
for f, flavor, count in test_files:
|
|
|
|
|
i = 0
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = [flavor]
|
|
|
|
|
regexs = fdroidserver.scanner.get_gradle_compile_commands(build)
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open(f, encoding='utf-8') as fp:
|
2020-05-27 22:03:23 +02:00
|
|
|
|
for line in fp.readlines():
|
|
|
|
|
for regex in regexs:
|
|
|
|
|
m = regex.match(line)
|
|
|
|
|
if m:
|
|
|
|
|
i += 1
|
|
|
|
|
self.assertEqual(count, i)
|
|
|
|
|
|
2020-06-03 23:40:01 +02:00
|
|
|
|
def test_scan_source_files_sneaky_maven(self):
|
|
|
|
|
"""Check for sneaking in banned maven repos"""
|
2021-06-07 11:49:21 +02:00
|
|
|
|
testdir = tempfile.mkdtemp(
|
|
|
|
|
prefix=inspect.currentframe().f_code.co_name, dir=self.tmpdir
|
|
|
|
|
)
|
2020-06-03 23:40:01 +02:00
|
|
|
|
os.chdir(testdir)
|
|
|
|
|
fdroidserver.scanner.config = None
|
|
|
|
|
fdroidserver.scanner.options = mock.Mock()
|
|
|
|
|
fdroidserver.scanner.options.json = True
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open('build.gradle', 'w', encoding='utf-8') as fp:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fp.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""
|
2020-06-03 23:40:01 +02:00
|
|
|
|
maven {
|
|
|
|
|
"https://jitpack.io"
|
|
|
|
|
url 'https://maven.fabric.io/public'
|
|
|
|
|
}
|
|
|
|
|
maven {
|
|
|
|
|
"https://maven.google.com"
|
|
|
|
|
setUrl('https://evilcorp.com/maven')
|
|
|
|
|
}
|
2021-06-07 11:49:21 +02:00
|
|
|
|
"""
|
|
|
|
|
)
|
|
|
|
|
)
|
2020-06-03 23:40:01 +02:00
|
|
|
|
count = fdroidserver.scanner.scan_source(testdir)
|
|
|
|
|
self.assertEqual(2, count, 'there should be this many errors')
|
|
|
|
|
|
2020-06-03 16:55:43 +02:00
|
|
|
|
def test_scan_source_file_types(self):
|
2020-06-17 10:33:55 +02:00
|
|
|
|
"""Build product files are not allowed, test they are detected
|
|
|
|
|
|
|
|
|
|
This test runs as if `fdroid build` running to test the
|
|
|
|
|
difference between absolute and relative paths.
|
|
|
|
|
|
|
|
|
|
"""
|
2021-06-07 11:49:21 +02:00
|
|
|
|
testdir = tempfile.mkdtemp(
|
|
|
|
|
prefix=inspect.currentframe().f_code.co_name, dir=self.tmpdir
|
|
|
|
|
)
|
2020-06-17 10:33:55 +02:00
|
|
|
|
build_dir = os.path.join('build', 'fake.app')
|
|
|
|
|
abs_build_dir = os.path.join(testdir, build_dir)
|
|
|
|
|
os.makedirs(abs_build_dir, exist_ok=True)
|
|
|
|
|
os.chdir(abs_build_dir)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
|
|
|
|
|
fdroidserver.scanner.config = None
|
|
|
|
|
fdroidserver.scanner.options = mock.Mock()
|
|
|
|
|
fdroidserver.scanner.options.json = True
|
|
|
|
|
|
|
|
|
|
keep = [
|
|
|
|
|
'arg.jar',
|
|
|
|
|
'ascii.out',
|
|
|
|
|
'baz.so',
|
2020-06-03 21:26:03 +02:00
|
|
|
|
'classes.dex',
|
2020-06-03 16:55:43 +02:00
|
|
|
|
'sqlcipher.aar',
|
|
|
|
|
'static.a',
|
2020-06-03 21:26:03 +02:00
|
|
|
|
'src/test/resources/classes.dex',
|
2020-06-03 16:55:43 +02:00
|
|
|
|
]
|
2021-06-07 11:49:21 +02:00
|
|
|
|
remove = ['gradle-wrapper.jar', 'gradlew', 'gradlew.bat']
|
2020-06-03 21:26:03 +02:00
|
|
|
|
os.makedirs('src/test/resources', exist_ok=True)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
for f in keep + remove:
|
|
|
|
|
with open(f, 'w') as fp:
|
|
|
|
|
fp.write('placeholder')
|
|
|
|
|
self.assertTrue(os.path.exists(f))
|
2021-06-07 11:49:21 +02:00
|
|
|
|
binaries = ['binary.out', 'fake.png', 'snippet.png']
|
2020-06-03 16:55:43 +02:00
|
|
|
|
with open('binary.out', 'wb') as fp:
|
|
|
|
|
fp.write(b'\x00\x00')
|
|
|
|
|
fp.write(uuid.uuid4().bytes)
|
|
|
|
|
shutil.copyfile('binary.out', 'fake.png')
|
|
|
|
|
os.chmod('fake.png', 0o755)
|
|
|
|
|
os.system('ls -l binary.out')
|
|
|
|
|
with open('snippet.png', 'wb') as fp:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fp.write(
|
|
|
|
|
b'\x89PNG\r\n\x1a\n\x00\x00\x00\rIHDR\x00\x00\x000\x00\x00'
|
|
|
|
|
b'\x000\x08\x06\x00\x00\x00W\x02\xf9\x87\x00\x00\x00\x04sB'
|
|
|
|
|
b'IT\x08\x08\x08\x08|\x08d\x88\x00\x00\x00\tpHYs\x00\x00\n'
|
|
|
|
|
b'a\x00\x00\na\x01\xfc\xccJ%\x00\x00\x00\x19tEXtSoftware'
|
|
|
|
|
)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
os.chmod('snippet.png', 0o755)
|
|
|
|
|
os.system('ls -l fake.png')
|
|
|
|
|
|
2020-06-17 10:33:55 +02:00
|
|
|
|
# run scanner as if from `fdroid build`
|
|
|
|
|
os.chdir(testdir)
|
|
|
|
|
count = fdroidserver.scanner.scan_source(build_dir)
|
2020-06-03 21:26:03 +02:00
|
|
|
|
self.assertEqual(6, count, 'there should be this many errors')
|
2020-06-17 10:33:55 +02:00
|
|
|
|
os.chdir(build_dir)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
|
|
|
|
|
for f in keep + binaries:
|
|
|
|
|
self.assertTrue(os.path.exists(f), f + ' should still be there')
|
|
|
|
|
for f in remove:
|
|
|
|
|
self.assertFalse(os.path.exists(f), f + ' should have been removed')
|
|
|
|
|
|
|
|
|
|
files = dict()
|
|
|
|
|
for section in ('errors', 'infos', 'warnings'):
|
|
|
|
|
files[section] = []
|
|
|
|
|
for msg, f in fdroidserver.scanner.json_per_build[section]:
|
|
|
|
|
files[section].append(f)
|
|
|
|
|
|
2022-09-22 11:51:59 +02:00
|
|
|
|
self.assertFalse(
|
|
|
|
|
'ascii.out' in files['errors'], 'ASCII .out file is not an error'
|
|
|
|
|
)
|
|
|
|
|
self.assertFalse(
|
|
|
|
|
'snippet.png' in files['errors'], 'executable valid image is not an error'
|
|
|
|
|
)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
|
|
|
|
|
self.assertTrue('arg.jar' in files['errors'], 'all JAR files are errors')
|
|
|
|
|
self.assertTrue('baz.so' in files['errors'], 'all .so files are errors')
|
2022-09-22 11:51:59 +02:00
|
|
|
|
self.assertTrue(
|
|
|
|
|
'binary.out' in files['errors'], 'a binary .out file is an error'
|
|
|
|
|
)
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
'classes.dex' in files['errors'], 'all classes.dex files are errors'
|
|
|
|
|
)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
self.assertTrue('sqlcipher.aar' in files['errors'], 'all AAR files are errors')
|
|
|
|
|
self.assertTrue('static.a' in files['errors'], 'all .a files are errors')
|
|
|
|
|
|
2022-09-22 11:51:59 +02:00
|
|
|
|
self.assertTrue(
|
|
|
|
|
'fake.png' in files['warnings'],
|
|
|
|
|
'a random binary that is executable that is not an image is a warning',
|
|
|
|
|
)
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
'src/test/resources/classes.dex' in files['warnings'],
|
|
|
|
|
'suspicious file but in a test dir is a warning',
|
|
|
|
|
)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
|
|
|
|
|
for f in remove:
|
2022-09-22 11:51:59 +02:00
|
|
|
|
self.assertTrue(
|
|
|
|
|
f in files['infos'], '%s should be removed with an info message' % f
|
|
|
|
|
)
|
2020-06-03 16:55:43 +02:00
|
|
|
|
|
2020-05-14 16:08:56 +02:00
|
|
|
|
def test_build_local_scanner(self):
|
|
|
|
|
"""`fdroid build` calls scanner functions, test them here"""
|
2021-06-07 11:49:21 +02:00
|
|
|
|
testdir = tempfile.mkdtemp(
|
|
|
|
|
prefix=inspect.currentframe().f_code.co_name, dir=self.tmpdir
|
|
|
|
|
)
|
2020-05-14 16:08:56 +02:00
|
|
|
|
os.chdir(testdir)
|
|
|
|
|
|
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
fdroidserver.common.config = config
|
2020-06-15 20:03:19 +02:00
|
|
|
|
fdroidserver.build.config = config
|
2020-05-14 16:08:56 +02:00
|
|
|
|
fdroidserver.build.options = mock.Mock()
|
|
|
|
|
fdroidserver.build.options.json = False
|
2020-06-15 20:03:19 +02:00
|
|
|
|
fdroidserver.build.options.scan_binary = False
|
2020-05-14 16:08:56 +02:00
|
|
|
|
fdroidserver.build.options.notarball = True
|
|
|
|
|
fdroidserver.build.options.skipscan = False
|
|
|
|
|
fdroidserver.scanner.options = fdroidserver.build.options
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'mocked.app.id'
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.commit = '1.0'
|
|
|
|
|
build.output = app.id + '.apk'
|
2020-06-03 15:12:04 +02:00
|
|
|
|
build.scanignore = ['baz.so', 'foo.aar']
|
2022-09-14 03:45:24 +02:00
|
|
|
|
build.versionCode = 1
|
2020-05-14 16:08:56 +02:00
|
|
|
|
build.versionName = '1.0'
|
|
|
|
|
vcs = mock.Mock()
|
|
|
|
|
|
|
|
|
|
for f in ('baz.so', 'foo.aar', 'gradle-wrapper.jar'):
|
|
|
|
|
with open(f, 'w') as fp:
|
|
|
|
|
fp.write('placeholder')
|
|
|
|
|
self.assertTrue(os.path.exists(f))
|
|
|
|
|
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open('build.xml', 'w', encoding='utf-8') as fp:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fp.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
2020-05-14 16:08:56 +02:00
|
|
|
|
<project basedir="." default="clean" name="mockapp">
|
|
|
|
|
<target name="release"/>
|
|
|
|
|
<target name="clean"/>
|
2021-06-07 11:49:21 +02:00
|
|
|
|
</project>"""
|
|
|
|
|
)
|
|
|
|
|
)
|
2020-05-14 16:08:56 +02:00
|
|
|
|
|
|
|
|
|
def make_fake_apk(output, build):
|
|
|
|
|
with open(build.output, 'w') as fp:
|
|
|
|
|
fp.write('APK PLACEHOLDER')
|
|
|
|
|
return output
|
|
|
|
|
|
|
|
|
|
with mock.patch('fdroidserver.common.replace_build_vars', wraps=make_fake_apk):
|
|
|
|
|
with mock.patch('fdroidserver.common.get_native_code', return_value='x86'):
|
2022-09-22 11:51:59 +02:00
|
|
|
|
with mock.patch(
|
|
|
|
|
'fdroidserver.common.get_apk_id',
|
|
|
|
|
return_value=(app.id, build.versionCode, build.versionName),
|
|
|
|
|
):
|
|
|
|
|
with mock.patch(
|
|
|
|
|
'fdroidserver.common.is_apk_and_debuggable', return_value=False
|
|
|
|
|
):
|
2020-05-14 16:08:56 +02:00
|
|
|
|
fdroidserver.build.build_local(
|
2022-09-22 11:51:59 +02:00
|
|
|
|
app,
|
|
|
|
|
build,
|
|
|
|
|
vcs,
|
|
|
|
|
build_dir=testdir,
|
|
|
|
|
output_dir=testdir,
|
|
|
|
|
log_dir=None,
|
|
|
|
|
srclib_dir=None,
|
|
|
|
|
extlib_dir=None,
|
|
|
|
|
tmp_dir=None,
|
|
|
|
|
force=False,
|
|
|
|
|
onserver=False,
|
|
|
|
|
refresh=False,
|
2020-05-14 16:08:56 +02:00
|
|
|
|
)
|
|
|
|
|
self.assertTrue(os.path.exists('baz.so'))
|
|
|
|
|
self.assertTrue(os.path.exists('foo.aar'))
|
|
|
|
|
self.assertFalse(os.path.exists('gradle-wrapper.jar'))
|
|
|
|
|
|
2020-06-03 23:40:01 +02:00
|
|
|
|
def test_gradle_maven_url_regex(self):
|
|
|
|
|
"""Check the regex can find all the cases"""
|
|
|
|
|
with open(os.path.join(self.basedir, 'gradle-maven-blocks.yaml')) as fp:
|
|
|
|
|
data = yaml.safe_load(fp)
|
|
|
|
|
|
|
|
|
|
urls = []
|
|
|
|
|
for entry in data:
|
|
|
|
|
found = False
|
|
|
|
|
for m in fdroidserver.scanner.MAVEN_URL_REGEX.findall(entry):
|
|
|
|
|
urls.append(m)
|
|
|
|
|
found = True
|
|
|
|
|
self.assertTrue(found, 'this block should produce a URL:\n' + entry)
|
|
|
|
|
self.assertEqual(len(data), len(urls), 'each data example should produce a URL')
|
|
|
|
|
|
2020-06-30 00:02:04 +02:00
|
|
|
|
def test_scan_gradle_file_with_multiple_problems(self):
|
|
|
|
|
"""Check that the scanner can handle scandelete with gradle files with multiple problems"""
|
2021-06-07 11:49:21 +02:00
|
|
|
|
testdir = tempfile.mkdtemp(
|
|
|
|
|
prefix=inspect.currentframe().f_code.co_name, dir=self.tmpdir
|
|
|
|
|
)
|
2020-06-30 00:02:04 +02:00
|
|
|
|
os.chdir(testdir)
|
|
|
|
|
fdroidserver.scanner.config = None
|
|
|
|
|
fdroidserver.scanner.options = mock.Mock()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.scandelete = ['build.gradle']
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open('build.gradle', 'w', encoding='utf-8') as fp:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fp.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""
|
2020-06-30 00:02:04 +02:00
|
|
|
|
maven {
|
|
|
|
|
url 'https://maven.fabric.io/public'
|
|
|
|
|
}
|
|
|
|
|
maven {
|
|
|
|
|
url 'https://evilcorp.com/maven'
|
|
|
|
|
}
|
2021-06-07 11:49:21 +02:00
|
|
|
|
"""
|
|
|
|
|
)
|
|
|
|
|
)
|
2020-06-30 00:02:04 +02:00
|
|
|
|
count = fdroidserver.scanner.scan_source(testdir, build)
|
|
|
|
|
self.assertFalse(os.path.exists("build.gradle"))
|
|
|
|
|
self.assertEqual(0, count, 'there should be this many errors')
|
2017-12-15 00:29:38 +01:00
|
|
|
|
|
2022-09-29 17:21:03 +02:00
|
|
|
|
def test_get_embedded_classes(self):
|
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
for f in (
|
|
|
|
|
'apk.embedded_1.apk',
|
|
|
|
|
'bad-unicode-πÇÇ现代通用字-български-عربي1.apk',
|
|
|
|
|
'janus.apk',
|
|
|
|
|
'minimal_targetsdk_30_unsigned.apk',
|
|
|
|
|
'no_targetsdk_minsdk1_unsigned.apk',
|
|
|
|
|
'org.bitbucket.tickytacky.mirrormirror_1.apk',
|
|
|
|
|
'org.bitbucket.tickytacky.mirrormirror_2.apk',
|
|
|
|
|
'org.bitbucket.tickytacky.mirrormirror_3.apk',
|
|
|
|
|
'org.bitbucket.tickytacky.mirrormirror_4.apk',
|
|
|
|
|
'org.dyndns.fules.ck_20.apk',
|
|
|
|
|
'SpeedoMeterApp.main_1.apk',
|
|
|
|
|
'urzip.apk',
|
|
|
|
|
'urzip-badcert.apk',
|
|
|
|
|
'urzip-badsig.apk',
|
|
|
|
|
'urzip-release.apk',
|
|
|
|
|
'urzip-release-unsigned.apk',
|
|
|
|
|
'repo/com.example.test.helloworld_1.apk',
|
|
|
|
|
'repo/com.politedroid_3.apk',
|
|
|
|
|
'repo/com.politedroid_4.apk',
|
|
|
|
|
'repo/com.politedroid_5.apk',
|
|
|
|
|
'repo/com.politedroid_6.apk',
|
|
|
|
|
'repo/duplicate.permisssions_9999999.apk',
|
|
|
|
|
'repo/info.zwanenburg.caffeinetile_4.apk',
|
|
|
|
|
'repo/no.min.target.sdk_987.apk',
|
|
|
|
|
'repo/obb.main.oldversion_1444412523.apk',
|
|
|
|
|
'repo/obb.mainpatch.current_1619_another-release-key.apk',
|
|
|
|
|
'repo/obb.mainpatch.current_1619.apk',
|
|
|
|
|
'repo/obb.main.twoversions_1101613.apk',
|
|
|
|
|
'repo/obb.main.twoversions_1101615.apk',
|
|
|
|
|
'repo/obb.main.twoversions_1101617.apk',
|
|
|
|
|
'repo/souch.smsbypass_9.apk',
|
|
|
|
|
'repo/urzip-; Рахма́, [rɐxˈmanʲɪnəf] سيرجي_رخمانينوف 谢·.apk',
|
|
|
|
|
'repo/v1.v2.sig_1020.apk',
|
|
|
|
|
):
|
|
|
|
|
self.assertNotEqual(
|
|
|
|
|
set(),
|
|
|
|
|
fdroidserver.scanner.get_embedded_classes(f),
|
|
|
|
|
'should return results for ' + f,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_get_embedded_classes_empty_archives(self):
|
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
print('basedir')
|
|
|
|
|
for f in (
|
|
|
|
|
'Norway_bouvet_europe_2.obf.zip',
|
|
|
|
|
'repo/fake.ota.update_1234.zip',
|
|
|
|
|
):
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
set(),
|
|
|
|
|
fdroidserver.scanner.get_embedded_classes(f),
|
|
|
|
|
'should return not results for ' + f,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
@unittest.skipIf(
|
|
|
|
|
sys.hexversion < 0x03090000, 'Python < 3.9 has a limited zipfile.is_zipfile()'
|
|
|
|
|
)
|
|
|
|
|
def test_get_embedded_classes_secret_apk(self):
|
|
|
|
|
"""Try to hide an APK+DEX in an APK and see if we can find it"""
|
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
apk = 'urzip.apk'
|
|
|
|
|
mapzip = 'Norway_bouvet_europe_2.obf.zip'
|
|
|
|
|
secretfile = os.path.join(
|
|
|
|
|
self.basedir, 'org.bitbucket.tickytacky.mirrormirror_1.apk'
|
|
|
|
|
)
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir:
|
|
|
|
|
shutil.copy(apk, tmpdir)
|
|
|
|
|
shutil.copy(mapzip, tmpdir)
|
|
|
|
|
os.chdir(tmpdir)
|
|
|
|
|
with zipfile.ZipFile(mapzip, 'a') as zipfp:
|
|
|
|
|
zipfp.write(secretfile, 'secretapk')
|
|
|
|
|
with zipfile.ZipFile(apk) as readfp:
|
|
|
|
|
with readfp.open('classes.dex') as cfp:
|
|
|
|
|
zipfp.writestr('secretdex', cfp.read())
|
|
|
|
|
with zipfile.ZipFile(apk, 'a') as zipfp:
|
|
|
|
|
zipfp.write(mapzip)
|
|
|
|
|
|
|
|
|
|
cls = fdroidserver.scanner.get_embedded_classes(apk)
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
'org/bitbucket/tickytacky/mirrormirror/MainActivity' in cls,
|
|
|
|
|
'this should find the classes in the hidden, embedded APK',
|
|
|
|
|
)
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
'DEX file with fake name: secretdex' in cls,
|
|
|
|
|
'badly named embedded DEX fils should throw an error',
|
|
|
|
|
)
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
'ZIP file without proper file extension: secretapk' in cls,
|
|
|
|
|
'badly named embedded ZIPs should throw an error',
|
|
|
|
|
)
|
|
|
|
|
|
2020-06-30 02:47:53 +02:00
|
|
|
|
|
2022-07-10 13:35:26 +02:00
|
|
|
|
class Test_scan_binary(unittest.TestCase):
|
|
|
|
|
def setUp(self):
|
|
|
|
|
self.basedir = os.path.join(localmodule, 'tests')
|
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.common.options = mock.Mock()
|
|
|
|
|
|
2022-09-23 18:33:02 +02:00
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL = mock.Mock()
|
2022-09-28 17:35:31 +02:00
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs = {}
|
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs['err_code_signatures'] = {
|
2022-10-06 14:50:30 +02:00
|
|
|
|
"java/lang/Object": re.compile(
|
|
|
|
|
r'.*java/lang/Object', re.IGNORECASE | re.UNICODE
|
|
|
|
|
)
|
2022-09-22 01:33:23 +02:00
|
|
|
|
}
|
2022-09-28 17:35:31 +02:00
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs['warn_code_signatures'] = {}
|
2022-09-22 01:33:23 +02:00
|
|
|
|
|
2022-07-10 13:35:26 +02:00
|
|
|
|
def test_code_signature_match(self):
|
|
|
|
|
apkfile = os.path.join(self.basedir, 'no_targetsdk_minsdk1_unsigned.apk')
|
2022-09-22 01:33:23 +02:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
1,
|
|
|
|
|
fdroidserver.scanner.scan_binary(apkfile),
|
2022-10-06 14:50:30 +02:00
|
|
|
|
"Did not find expected code signature '{}' in binary '{}'".format(
|
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs[
|
|
|
|
|
'err_code_signatures'
|
|
|
|
|
].values(),
|
|
|
|
|
apkfile,
|
|
|
|
|
),
|
2022-09-22 01:33:23 +02:00
|
|
|
|
)
|
2022-07-10 13:35:26 +02:00
|
|
|
|
|
2022-07-14 12:56:15 +02:00
|
|
|
|
@unittest.skipIf(
|
|
|
|
|
sys.version_info < (3, 9),
|
|
|
|
|
"Our implementation for traversing zip files will silently fail to work"
|
|
|
|
|
"on older python versions, also see: "
|
2022-09-22 11:51:59 +02:00
|
|
|
|
"https://gitlab.com/fdroid/fdroidserver/-/merge_requests/1110#note_932026766",
|
2022-07-14 12:56:15 +02:00
|
|
|
|
)
|
|
|
|
|
def test_bottom_level_embedded_apk_code_signature(self):
|
2022-07-10 13:35:26 +02:00
|
|
|
|
apkfile = os.path.join(self.basedir, 'apk.embedded_1.apk')
|
2022-09-28 17:35:31 +02:00
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs['err_code_signatures'] = {
|
2022-09-22 11:51:59 +02:00
|
|
|
|
"org/bitbucket/tickytacky/mirrormirror/MainActivity": re.compile(
|
2022-10-06 14:50:30 +02:00
|
|
|
|
r'.*org/bitbucket/tickytacky/mirrormirror/MainActivity',
|
|
|
|
|
re.IGNORECASE | re.UNICODE,
|
2022-09-22 11:51:59 +02:00
|
|
|
|
)
|
|
|
|
|
}
|
2022-09-22 01:33:23 +02:00
|
|
|
|
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
1,
|
|
|
|
|
fdroidserver.scanner.scan_binary(apkfile),
|
2022-10-06 14:50:30 +02:00
|
|
|
|
"Did not find expected code signature '{}' in binary '{}'".format(
|
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs[
|
|
|
|
|
'err_code_signatures'
|
|
|
|
|
].values(),
|
|
|
|
|
apkfile,
|
|
|
|
|
),
|
2022-09-22 01:33:23 +02:00
|
|
|
|
)
|
2022-07-10 13:35:26 +02:00
|
|
|
|
|
|
|
|
|
def test_top_level_signature_embedded_apk_present(self):
|
|
|
|
|
apkfile = os.path.join(self.basedir, 'apk.embedded_1.apk')
|
2022-09-28 17:35:31 +02:00
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs['err_code_signatures'] = {
|
2022-09-22 11:51:59 +02:00
|
|
|
|
"org/fdroid/ci/BuildConfig": re.compile(
|
|
|
|
|
r'.*org/fdroid/ci/BuildConfig', re.IGNORECASE | re.UNICODE
|
|
|
|
|
)
|
|
|
|
|
}
|
|
|
|
|
self.assertEqual(
|
2022-09-22 01:33:23 +02:00
|
|
|
|
1,
|
|
|
|
|
fdroidserver.scanner.scan_binary(apkfile),
|
2022-10-06 14:50:30 +02:00
|
|
|
|
"Did not find expected code signature '{}' in binary '{}'".format(
|
|
|
|
|
fdroidserver.scanner._SCANNER_TOOL.regexs[
|
|
|
|
|
'err_code_signatures'
|
|
|
|
|
].values(),
|
|
|
|
|
apkfile,
|
|
|
|
|
),
|
2022-09-22 11:51:59 +02:00
|
|
|
|
)
|
2022-07-10 13:35:26 +02:00
|
|
|
|
|
2022-07-06 02:05:58 +02:00
|
|
|
|
|
2022-09-22 01:33:23 +02:00
|
|
|
|
class Test_SignatureDataController(unittest.TestCase):
|
|
|
|
|
# __init__
|
|
|
|
|
def test_init(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-22 01:33:23 +02:00
|
|
|
|
self.assertEqual(sdc.name, 'nnn')
|
|
|
|
|
self.assertEqual(sdc.filename, 'fff.yml')
|
2022-09-30 04:44:14 +02:00
|
|
|
|
self.assertEqual(sdc.cache_duration, timedelta(999999))
|
2022-09-22 01:33:23 +02:00
|
|
|
|
self.assertDictEqual(sdc.data, {})
|
|
|
|
|
|
|
|
|
|
# check_last_updated
|
|
|
|
|
def test_check_last_updated_ok(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-30 14:18:31 +02:00
|
|
|
|
sdc.data['last_updated'] = datetime.utcnow().timestamp()
|
2022-09-22 01:33:23 +02:00
|
|
|
|
sdc.check_last_updated()
|
|
|
|
|
|
|
|
|
|
def test_check_last_updated_exception_cache_outdated(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-30 04:44:14 +02:00
|
|
|
|
sdc.cache_duration = timedelta(days=7)
|
2022-09-30 14:18:31 +02:00
|
|
|
|
sdc.data['last_updated'] = (datetime.utcnow() - timedelta(days=30)).timestamp()
|
2022-09-23 18:33:02 +02:00
|
|
|
|
with self.assertRaises(fdroidserver.scanner.SignatureDataOutdatedException):
|
2022-09-22 01:33:23 +02:00
|
|
|
|
sdc.check_last_updated()
|
|
|
|
|
|
|
|
|
|
def test_check_last_updated_exception_not_string(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-30 14:18:31 +02:00
|
|
|
|
sdc.data['last_updated'] = 'sepp'
|
2022-09-23 18:33:02 +02:00
|
|
|
|
with self.assertRaises(fdroidserver.scanner.SignatureDataMalformedException):
|
2022-09-22 01:33:23 +02:00
|
|
|
|
sdc.check_last_updated()
|
|
|
|
|
|
|
|
|
|
def test_check_last_updated_exception_not_iso_formatted_string(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-30 04:44:14 +02:00
|
|
|
|
sdc.data['last_updated'] = '01/09/2002 10:11'
|
2022-09-23 18:33:02 +02:00
|
|
|
|
with self.assertRaises(fdroidserver.scanner.SignatureDataMalformedException):
|
2022-09-22 01:33:23 +02:00
|
|
|
|
sdc.check_last_updated()
|
|
|
|
|
|
2022-09-30 04:44:14 +02:00
|
|
|
|
def test_check_last_updated_no_exception_missing_when_last_updated_not_set(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-30 04:44:14 +02:00
|
|
|
|
sdc.check_last_updated()
|
|
|
|
|
|
2022-09-22 01:33:23 +02:00
|
|
|
|
# check_data_version
|
|
|
|
|
def test_check_data_version_ok(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-22 01:33:23 +02:00
|
|
|
|
sdc.data['version'] = fdroidserver.scanner.SCANNER_CACHE_VERSION
|
|
|
|
|
sdc.check_data_version()
|
|
|
|
|
|
|
|
|
|
def test_check_data_version_exception(self):
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
|
|
|
|
with self.assertRaises(
|
|
|
|
|
fdroidserver.scanner.SignatureDataVersionMismatchException
|
|
|
|
|
):
|
2022-09-22 01:33:23 +02:00
|
|
|
|
sdc.check_data_version()
|
|
|
|
|
|
2022-10-06 14:50:30 +02:00
|
|
|
|
def test_load_ok(self):
|
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
|
|
|
|
func_lfc = mock.Mock()
|
|
|
|
|
func_vd = mock.Mock()
|
|
|
|
|
func_clu = mock.Mock()
|
|
|
|
|
with mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.load_from_cache',
|
|
|
|
|
func_lfc,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.verify_data',
|
|
|
|
|
func_vd,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.check_last_updated',
|
|
|
|
|
func_clu,
|
|
|
|
|
):
|
|
|
|
|
sdc.load()
|
|
|
|
|
func_lfc.assert_called_once_with()
|
|
|
|
|
func_vd.assert_called_once_with()
|
|
|
|
|
func_clu.assert_called_once_with()
|
|
|
|
|
|
|
|
|
|
def test_load_initial_cache_miss(self):
|
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
|
|
|
|
func_lfc = mock.Mock(
|
|
|
|
|
side_effect=fdroidserver.scanner.SignatureDataCacheMissException
|
|
|
|
|
)
|
|
|
|
|
func_lfd = mock.Mock()
|
|
|
|
|
with mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.load_from_cache',
|
|
|
|
|
func_lfc,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.load_from_defaults',
|
|
|
|
|
func_lfd,
|
|
|
|
|
):
|
|
|
|
|
sdc.load()
|
|
|
|
|
func_lfc.assert_called_once_with()
|
|
|
|
|
func_lfd.assert_called_once_with()
|
|
|
|
|
|
|
|
|
|
def test_load_cache_auto_refresh(self):
|
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
|
|
|
|
func_lfc = mock.Mock()
|
|
|
|
|
func_vd = mock.Mock()
|
|
|
|
|
func_clu = mock.Mock(
|
|
|
|
|
side_effect=fdroidserver.scanner.SignatureDataOutdatedException()
|
|
|
|
|
)
|
|
|
|
|
func_fsfw = mock.Mock()
|
|
|
|
|
func_wtc = mock.Mock()
|
|
|
|
|
with mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.load_from_cache',
|
|
|
|
|
func_lfc,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.verify_data',
|
|
|
|
|
func_vd,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.check_last_updated',
|
|
|
|
|
func_clu,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.fetch_signatures_from_web',
|
|
|
|
|
func_fsfw,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.write_to_cache',
|
|
|
|
|
func_wtc,
|
|
|
|
|
):
|
|
|
|
|
sdc.load()
|
|
|
|
|
func_lfc.assert_called_once_with()
|
|
|
|
|
func_vd.assert_called_once_with()
|
|
|
|
|
func_clu.assert_called_once_with()
|
|
|
|
|
func_fsfw.assert_called_once_with()
|
|
|
|
|
func_wtc.assert_called_once_with()
|
|
|
|
|
|
2022-10-13 16:33:33 +02:00
|
|
|
|
def test_load_try_web_when_no_defaults(self):
|
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
|
|
|
|
func_lfc = mock.Mock(
|
|
|
|
|
side_effect=fdroidserver.scanner.SignatureDataCacheMissException()
|
|
|
|
|
)
|
|
|
|
|
func_lfd = mock.Mock(
|
|
|
|
|
side_effect=fdroidserver.scanner.SignatureDataNoDefaultsException()
|
|
|
|
|
)
|
|
|
|
|
func_fsfw = mock.Mock()
|
|
|
|
|
func_wtc = mock.Mock()
|
|
|
|
|
with mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.load_from_cache',
|
|
|
|
|
func_lfc,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.load_from_defaults',
|
|
|
|
|
func_lfd,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.fetch_signatures_from_web',
|
|
|
|
|
func_fsfw,
|
|
|
|
|
), mock.patch(
|
|
|
|
|
'fdroidserver.scanner.SignatureDataController.write_to_cache',
|
|
|
|
|
func_wtc,
|
|
|
|
|
):
|
|
|
|
|
sdc.load()
|
|
|
|
|
func_lfc.assert_called_once_with()
|
|
|
|
|
func_lfd.assert_called_once_with()
|
|
|
|
|
func_fsfw.assert_called_once_with()
|
|
|
|
|
func_wtc.assert_called_once_with()
|
|
|
|
|
|
2022-09-30 14:54:28 +02:00
|
|
|
|
@unittest.skipIf(
|
|
|
|
|
sys.version_info < (3, 9, 0),
|
|
|
|
|
"mock_open doesn't allow easy access to written data in older python versions",
|
|
|
|
|
)
|
2022-09-28 17:35:31 +02:00
|
|
|
|
def test_write_to_cache(self):
|
|
|
|
|
open_func = mock.mock_open()
|
2022-10-06 14:50:30 +02:00
|
|
|
|
sdc = fdroidserver.scanner.SignatureDataController(
|
|
|
|
|
'nnn', 'fff.yml', 'https://example.com/test.json'
|
|
|
|
|
)
|
2022-09-28 17:35:31 +02:00
|
|
|
|
sdc.data = {"mocked": "data"}
|
|
|
|
|
|
|
|
|
|
with mock.patch("builtins.open", open_func), mock.patch(
|
|
|
|
|
"fdroidserver.scanner._scanner_cachedir",
|
|
|
|
|
return_value=pathlib.Path('.'),
|
|
|
|
|
):
|
|
|
|
|
sdc.write_to_cache()
|
|
|
|
|
|
|
|
|
|
open_func.assert_called_with(pathlib.Path('fff.yml'), 'w', encoding="utf-8")
|
2022-10-06 14:50:30 +02:00
|
|
|
|
self.assertEqual(mock_open_to_str(open_func), """{\n "mocked": "data"\n}""")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Test_ScannerTool(unittest.TestCase):
|
|
|
|
|
def test_load(self):
|
|
|
|
|
st = mock.Mock()
|
|
|
|
|
st.sdcs = [mock.Mock(), mock.Mock()]
|
|
|
|
|
fdroidserver.scanner.ScannerTool.load(st)
|
|
|
|
|
st.sdcs[0].load.assert_called_once_with()
|
|
|
|
|
st.sdcs[1].load.assert_called_once_with()
|
2022-09-28 17:35:31 +02:00
|
|
|
|
|
2022-09-22 01:33:23 +02:00
|
|
|
|
|
2022-07-17 15:52:52 +02:00
|
|
|
|
class Test_main(unittest.TestCase):
|
|
|
|
|
def setUp(self):
|
|
|
|
|
self.args = ["com.example.app", "local/additional.apk", "another.apk"]
|
|
|
|
|
self.exit_func = mock.Mock()
|
|
|
|
|
self.read_app_args_func = mock.Mock(return_value={})
|
|
|
|
|
self.scan_binary_func = mock.Mock(return_value=0)
|
|
|
|
|
|
|
|
|
|
def test_parsing_appid(self):
|
|
|
|
|
"""
|
|
|
|
|
This test verifies that app id get parsed correctly
|
|
|
|
|
(doesn't test how they get processed)
|
|
|
|
|
"""
|
|
|
|
|
self.args = ["com.example.app"]
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir), mock.patch(
|
|
|
|
|
"sys.exit", self.exit_func
|
|
|
|
|
), mock.patch("sys.argv", ["fdroid scanner", *self.args]), mock.patch(
|
|
|
|
|
"fdroidserver.common.read_app_args", self.read_app_args_func
|
2022-09-22 11:51:59 +02:00
|
|
|
|
), mock.patch(
|
|
|
|
|
"fdroidserver.scanner.scan_binary", self.scan_binary_func
|
|
|
|
|
):
|
2022-07-17 15:52:52 +02:00
|
|
|
|
fdroidserver.scanner.main()
|
|
|
|
|
|
|
|
|
|
self.exit_func.assert_not_called()
|
|
|
|
|
self.read_app_args_func.assert_called_once_with(
|
|
|
|
|
['com.example.app'], collections.OrderedDict(), True
|
|
|
|
|
)
|
|
|
|
|
self.scan_binary_func.assert_not_called()
|
|
|
|
|
|
|
|
|
|
def test_parsing_apkpath(self):
|
|
|
|
|
"""
|
|
|
|
|
This test verifies that apk paths get parsed correctly
|
|
|
|
|
(doesn't test how they get processed)
|
|
|
|
|
"""
|
|
|
|
|
self.args = ["local.application.apk"]
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir), mock.patch(
|
|
|
|
|
"sys.exit", self.exit_func
|
|
|
|
|
), mock.patch("sys.argv", ["fdroid scanner", *self.args]), mock.patch(
|
|
|
|
|
"fdroidserver.common.read_app_args", self.read_app_args_func
|
2022-09-22 11:51:59 +02:00
|
|
|
|
), mock.patch(
|
|
|
|
|
"fdroidserver.scanner.scan_binary", self.scan_binary_func
|
|
|
|
|
):
|
2022-07-17 15:52:52 +02:00
|
|
|
|
pathlib.Path(self.args[0]).touch()
|
|
|
|
|
fdroidserver.scanner.main()
|
|
|
|
|
|
|
|
|
|
self.exit_func.assert_not_called()
|
|
|
|
|
self.read_app_args_func.assert_not_called()
|
2022-09-28 17:35:31 +02:00
|
|
|
|
self.scan_binary_func.assert_called_once_with('local.application.apk')
|
2022-07-17 15:52:52 +02:00
|
|
|
|
|
|
|
|
|
|
2017-12-15 00:29:38 +01:00
|
|
|
|
if __name__ == "__main__":
|
2018-08-14 10:34:13 +02:00
|
|
|
|
os.chdir(os.path.dirname(__file__))
|
|
|
|
|
|
2017-12-15 00:29:38 +01:00
|
|
|
|
parser = optparse.OptionParser()
|
2021-06-07 11:49:21 +02:00
|
|
|
|
parser.add_option(
|
|
|
|
|
"-v",
|
|
|
|
|
"--verbose",
|
|
|
|
|
action="store_true",
|
|
|
|
|
default=False,
|
|
|
|
|
help="Spew out even more information than normal",
|
|
|
|
|
)
|
2017-12-15 00:29:38 +01:00
|
|
|
|
(fdroidserver.common.options, args) = parser.parse_args(['--verbose'])
|
|
|
|
|
|
|
|
|
|
newSuite = unittest.TestSuite()
|
2022-10-06 14:50:30 +02:00
|
|
|
|
newSuite.addTests(
|
|
|
|
|
[
|
|
|
|
|
unittest.makeSuite(ScannerTest),
|
|
|
|
|
unittest.makeSuite(Test_scan_binary),
|
|
|
|
|
unittest.makeSuite(Test_SignatureDataController),
|
|
|
|
|
unittest.makeSuite(Test_main),
|
|
|
|
|
]
|
|
|
|
|
)
|
2017-12-15 00:29:38 +01:00
|
|
|
|
unittest.main(failfast=False)
|