1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-27 03:21:53 +03:00
samba-mirror/python/samba/tests/source_chars.py
Andreas Schneider 24dd45613a python:tests: Skip the source_chars test if not a git dir
This test doesn't work in release tarballs. Skip it if git fails.

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: David Mulder <dmulder@samba.org>

Autobuild-User(master): Volker Lendecke <vl@samba.org>
Autobuild-Date(master): Fri Apr 21 13:59:29 UTC 2023 on atb-devel-224
2023-04-21 13:59:29 +00:00

321 lines
9.3 KiB
Python

# Unix SMB/CIFS implementation.
#
# Copyright (C) Catalyst.Net Ltd. 2021
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import subprocess
import os
import sys
from collections import Counter
from samba.colour import c_RED, c_GREEN, c_DARK_YELLOW, switch_colour_off
import re
import unicodedata as u
from samba.tests import TestCase, SkipTest
if not sys.stdout.isatty():
switch_colour_off()
def _find_root():
try:
p = subprocess.run(['git', 'rev-parse', '--show-toplevel'],
stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
timeout=10)
except subprocess.CalledProcessError as err:
print(c_RED("Error running git (is this a git tree?): %s" % (err)))
SkipTest("This test is only useful in a git working tree")
sys.exit(0)
if p.returncode != 0:
raise SkipTest("This test is only useful in a git working tree")
sys.exit(0)
root = p.stdout.decode().strip()
should_be_roots = (
os.path.abspath(os.path.join(os.path.dirname(__file__),
"../../..")),
os.path.abspath(os.path.join(os.path.dirname(__file__),
"../../../..")),
)
if root not in should_be_roots:
print(c_RED("It looks like we have found the wrong git tree!"))
sys.exit(1)
return root
ROOT = None
IGNORED_FILES = (
'examples/validchars/validchr.com',
'examples/tridge/smb.conf',
'source3/selftest/ktest-krb5_ccache-2',
'source3/selftest/ktest-krb5_ccache-3',
'testdata/source-chars-bad.c',
)
IGNORED_RE = (
r'^third_party/heimdal/lib/hcrypto/passwd_dialog',
r'^third_party/heimdal/lib/hx509/data/',
r'^third_party/heimdal/po',
r'^third_party/heimdal/tests/kdc/hdb-mitdb',
r'^testdata/compression/',
r'^third_party/heimdal/lib/asn1/fuzz-inputs/',
)
IGNORED_EXTENSIONS = {
'bmp',
'cer',
'corrupt',
'crl',
'crt',
'dat',
'der',
'dump',
'gpg',
'gz',
'ico',
'keytab',
'ldb',
'p12',
'pdf',
'pem',
'png',
'SAMBABACKUP',
'sxd',
'tdb',
'tif',
'reg',
'req'
}
# This list is by no means exhaustive -- these are just the format
# characters we actually use.
SAFE_FORMAT_CHARS = {
'\u200b',
'\ufeff'
}
# These files legitimately mix left-to-right and right-to-left text.
# In the real world mixing directions would be normal in bilingual
# documents, but it is rare in Samba source code.
BIDI_FILES = {
'third_party/heimdal/lib/base/test_base.c',
'third_party/heimdal/lib/wind/NormalizationTest.txt',
'testdata/source-chars-bidi.py',
}
def get_git_files():
try:
p = subprocess.run(['git',
'-C', ROOT,
'ls-files',
'-z'],
stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
timeout=10)
except subprocess.SubprocessError as e:
print(c_RED(f"Error running git (is this a git tree?): {e}"))
print("This test is only useful in a git working tree")
return []
filenames = p.stdout.split(b'\x00')
return [x.decode() for x in filenames[:-1]]
def iter_source_files():
filenames = get_git_files()
for name in filenames:
ignore = False
if name in IGNORED_FILES:
print(c_DARK_YELLOW(f"ignoring (exact) {name}"))
continue
for ignored in IGNORED_RE:
ignore = (re.match(ignored, name))
if ignore:
break
if ignore:
print(c_DARK_YELLOW(f"ignoring (via RE) {name}"))
continue
if '.' in name:
ext = name.rsplit('.', 1)[1]
if ext in IGNORED_EXTENSIONS:
print(c_DARK_YELLOW(f"ignoring {name}"))
continue
yield name
def is_latin1_file(name):
for pattern in (
r'^source4/setup/ad-schema/\w+.ldf$',
r'^source4/setup/display-specifiers/D[\w-]+.txt$',
r'^third_party/heimdal/cf/pkg.m4$',
r'^third_party/heimdal/doc/standardisation/',
):
if re.match(pattern, name):
return True
return False
def is_bad_latin1_file(fullname):
# In practice, the few latin-1 files we have have single non-ASCII
# byte islands in a sea of ASCII. The utf-8 sequences we are
# concerned about involve sequences of 3 high bytes. We can say a
# file is safe latin-1 if it has only individual high bytes.
with open(fullname, 'rb') as f:
b = f.read()
in_seq = False
for c in b:
if c > 0x7f:
if in_seq:
return True
in_seq = True
else:
in_seq = False
return False
def is_bad_char(c):
if u.category(c) != 'Cf':
return False
if c in SAFE_FORMAT_CHARS:
return False
return True
class CharacterTests(TestCase):
def setUp(self):
global ROOT
if not ROOT:
ROOT = _find_root()
def test_no_unexpected_format_chars(self):
"""This test tries to ensure that no source file has unicode control
characters that can change the apparent order of other
characters. These characters could make code appear to have
different semantic meaning it really does.
This issue is sometimes called "Trojan Source", "CVE-2021-42574",
or "CVE-2021-42694".
"""
for name in iter_source_files():
fullname = os.path.join(ROOT, name)
try:
with open(fullname) as f:
s = f.read()
except UnicodeDecodeError as e:
# probably a latin-1 encoding, which we tolerate in a few
# files for historical reasons, though we check that there
# are not long sequences of high bytes.
if is_latin1_file(name):
if is_bad_latin1_file(fullname):
self.fail(f"latin-1 file {name} has long sequences "
"of high bytes")
else:
self.fail(f"could not decode {name}: {e}")
dirs = set()
for c in set(s):
if is_bad_char(c):
self.fail(f"{name} has potentially bad format characters!")
dirs.add(u.bidirectional(c))
if 'L' in dirs and 'R' in dirs:
if name not in BIDI_FILES:
self.fail(f"{name} has LTR and RTL text ({dirs})")
def test_unexpected_format_chars_do_fail(self):
"""Test the test"""
for name, n_bad in [
('testdata/source-chars-bad.c', 3)
]:
fullname = os.path.join(ROOT, name)
with open(fullname) as f:
s = f.read()
chars = set(s)
bad_chars = [c for c in chars if is_bad_char(c)]
self.assertEqual(len(bad_chars), n_bad)
def test_unexpected_bidi_fails(self):
"""Test the test"""
for name in [
'testdata/source-chars-bidi.py'
]:
fullname = os.path.join(ROOT, name)
with open(fullname) as f:
s = f.read()
dirs = set()
for c in set(s):
dirs.add(u.bidirectional(c))
self.assertIn('L', dirs)
self.assertIn('R', dirs)
def check_file_text():
"""If called directly as a script, count the found characters."""
counts = Counter()
for name in iter_source_files():
fullname = os.path.join(ROOT, name)
try:
with open(fullname) as f:
s = f.read()
except UnicodeDecodeError as e:
if is_latin1_file(name):
if is_bad_latin1_file(fullname):
print(c_RED(f"latin-1 file {name} has long sequences "
"of high bytes"))
else:
print(c_GREEN(f"latin-1 file {name} is fine"))
else:
print(c_RED(f"can't read {name}: {e}"))
counts.update(s)
chars = set(s)
for c in chars:
if u.category(c) == 'Cf':
print(c_GREEN(f"{name} has {u.name(c)}"))
print(len(counts))
controls = []
formats = []
others = []
for x in counts:
c = u.category(x)
if c == 'Cc':
controls.append(x)
elif c == 'Cf':
formats.append(x)
elif c[0] == 'C':
others.append(x)
print("normal control characters {controls}")
print("format characters {formats}")
print("other control characters {others}")
if __name__ == '__main__':
check_file_text()