mirror of
https://github.com/f-droid/fdroidserver.git
synced 2025-09-13 22:42:29 +03:00
Merge branch 'apk-v1-signature-regex-fix' into 'master'
match the full file name when looking for the v1 signature block See merge request fdroid/fdroidserver!1588
This commit is contained in:
commit
4c88b19bae
3 changed files with 30 additions and 2 deletions
2
.bandit
2
.bandit
|
@ -1,3 +1,3 @@
|
||||||
[bandit]
|
[bandit]
|
||||||
skips: B110,B404,B408,B410,B603,B607
|
skips: B110,B404,B408,B603,B607
|
||||||
targets: .
|
targets: .
|
||||||
|
|
|
@ -94,7 +94,7 @@ MINIMUM_APKSIGNER_BUILD_TOOLS_VERSION = '30.0.0'
|
||||||
VERCODE_OPERATION_RE = re.compile(r'^([ 0-9/*+-]|%c)+$')
|
VERCODE_OPERATION_RE = re.compile(r'^([ 0-9/*+-]|%c)+$')
|
||||||
|
|
||||||
# A signature block file with a .DSA, .RSA, or .EC extension
|
# A signature block file with a .DSA, .RSA, or .EC extension
|
||||||
SIGNATURE_BLOCK_FILE_REGEX = re.compile(r'^META-INF/.*\.(DSA|EC|RSA)$')
|
SIGNATURE_BLOCK_FILE_REGEX = re.compile(r'\AMETA-INF/.*\.(DSA|EC|RSA)\Z', re.DOTALL)
|
||||||
APK_NAME_REGEX = re.compile(r'^([a-zA-Z][\w.]*)_(-?[0-9]+)_?([0-9a-f]{7})?\.apk')
|
APK_NAME_REGEX = re.compile(r'^([a-zA-Z][\w.]*)_(-?[0-9]+)_?([0-9a-f]{7})?\.apk')
|
||||||
APK_ID_TRIPLET_REGEX = re.compile(r"^package: name='(\w[^']*)' versionCode='([^']+)' versionName='([^']*)'")
|
APK_ID_TRIPLET_REGEX = re.compile(r"^package: name='(\w[^']*)' versionCode='([^']+)' versionName='([^']*)'")
|
||||||
STANDARD_FILE_NAME_REGEX = re.compile(r'^(\w[\w.]*)_(-?[0-9]+)\.\w+')
|
STANDARD_FILE_NAME_REGEX = re.compile(r'^(\w[\w.]*)_(-?[0-9]+)\.\w+')
|
||||||
|
|
|
@ -3253,6 +3253,34 @@ class SignerExtractionTest(unittest.TestCase):
|
||||||
fdroidserver.common.signer_fingerprint(v3_certs[0]),
|
fdroidserver.common.signer_fingerprint(v3_certs[0]),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
def test_signature_block_file_regex(self):
|
||||||
|
for apkpath, fingerprint in APKS_WITH_JAR_SIGNATURES:
|
||||||
|
with ZipFile(apkpath, 'r') as apk:
|
||||||
|
cert_files = [
|
||||||
|
n
|
||||||
|
for n in apk.namelist()
|
||||||
|
if fdroidserver.common.SIGNATURE_BLOCK_FILE_REGEX.match(n)
|
||||||
|
]
|
||||||
|
self.assertEqual(1, len(cert_files))
|
||||||
|
|
||||||
|
def test_signature_block_file_regex_malicious(self):
|
||||||
|
apkpath = os.path.join(self.testdir, 'malicious.apk')
|
||||||
|
with ZipFile(apkpath, 'w') as apk:
|
||||||
|
apk.writestr('META-INF/MANIFEST.MF', 'this is fake sig data')
|
||||||
|
apk.writestr('META-INF/CERT.SF\n', 'this is fake sig data')
|
||||||
|
apk.writestr('META-INF/AFTER.SF', 'this is fake sig data')
|
||||||
|
apk.writestr('META-INF/CERT.RSA\n', 'this is fake sig data')
|
||||||
|
apk.writestr('META-INF/AFTER.RSA', 'this is fake sig data')
|
||||||
|
with ZipFile(apkpath, 'r') as apk:
|
||||||
|
self.assertEqual(
|
||||||
|
['META-INF/AFTER.RSA'],
|
||||||
|
[
|
||||||
|
n
|
||||||
|
for n in apk.namelist()
|
||||||
|
if fdroidserver.common.SIGNATURE_BLOCK_FILE_REGEX.match(n)
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
class ConfigOptionsScopeTest(unittest.TestCase):
|
class ConfigOptionsScopeTest(unittest.TestCase):
|
||||||
"""Test assumptions about variable scope for "config" and "options".
|
"""Test assumptions about variable scope for "config" and "options".
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue