Commit d138bff0f04f215c2b75619eb0a6d52b3e346d99
Committed by
GitHub
Merge pull request #446 from christian-intra2net/unittest-fixes
Unittest fixes, reduce output
Showing
11 changed files
with
193 additions
and
119 deletions
oletools/crypto.py
| ... | ... | @@ -236,7 +236,8 @@ def is_encrypted(some_file): |
| 236 | 236 | if zipfile.is_zipfile(some_file): |
| 237 | 237 | return _is_encrypted_zip(some_file) |
| 238 | 238 | # otherwise assume it is the name of an ole file |
| 239 | - return _is_encrypted_ole(OleFileIO(some_file)) | |
| 239 | + with OleFileIO(some_file) as ole: | |
| 240 | + return _is_encrypted_ole(ole) | |
| 240 | 241 | except Exception as exc: |
| 241 | 242 | log.warning('Failed to check {} for encryption ({}); assume it is not ' |
| 242 | 243 | 'encrypted.'.format(some_file, exc)) | ... | ... |
oletools/msodde.py
| ... | ... | @@ -493,17 +493,23 @@ def process_xls(filepath): |
| 493 | 493 | """ find dde links in excel ole file """ |
| 494 | 494 | |
| 495 | 495 | result = [] |
| 496 | - for stream in xls_parser.XlsFile(filepath).iter_streams(): | |
| 497 | - if not isinstance(stream, xls_parser.WorkbookStream): | |
| 498 | - continue | |
| 499 | - for record in stream.iter_records(): | |
| 500 | - if not isinstance(record, xls_parser.XlsRecordSupBook): | |
| 496 | + xls_file = None | |
| 497 | + try: | |
| 498 | + xls_file = xls_parser.XlsFile(filepath) | |
| 499 | + for stream in xls_file.iter_streams(): | |
| 500 | + if not isinstance(stream, xls_parser.WorkbookStream): | |
| 501 | 501 | continue |
| 502 | - if record.support_link_type in ( | |
| 503 | - xls_parser.XlsRecordSupBook.LINK_TYPE_OLE_DDE, | |
| 504 | - xls_parser.XlsRecordSupBook.LINK_TYPE_EXTERNAL): | |
| 505 | - result.append(record.virt_path.replace(u'\u0003', u' ')) | |
| 506 | - return u'\n'.join(result) | |
| 502 | + for record in stream.iter_records(): | |
| 503 | + if not isinstance(record, xls_parser.XlsRecordSupBook): | |
| 504 | + continue | |
| 505 | + if record.support_link_type in ( | |
| 506 | + xls_parser.XlsRecordSupBook.LINK_TYPE_OLE_DDE, | |
| 507 | + xls_parser.XlsRecordSupBook.LINK_TYPE_EXTERNAL): | |
| 508 | + result.append(record.virt_path.replace(u'\u0003', u' ')) | |
| 509 | + return u'\n'.join(result) | |
| 510 | + finally: | |
| 511 | + if xls_file is not None: | |
| 512 | + xls_file.close() | |
| 507 | 513 | |
| 508 | 514 | |
| 509 | 515 | def process_docx(filepath, field_filter_mode=None): |
| ... | ... | @@ -908,13 +914,12 @@ def process_file(filepath, field_filter_mode=None): |
| 908 | 914 | if xls_parser.is_xls(filepath): |
| 909 | 915 | logger.debug('Process file as excel 2003 (xls)') |
| 910 | 916 | return process_xls(filepath) |
| 911 | - | |
| 912 | - ole = olefile.OleFileIO(filepath, path_encoding=None) | |
| 913 | - if is_ppt(ole): | |
| 917 | + if is_ppt(filepath): | |
| 914 | 918 | logger.debug('is ppt - cannot have DDE') |
| 915 | 919 | return u'' |
| 916 | 920 | logger.debug('Process file as word 2003 (doc)') |
| 917 | - return process_doc(ole) | |
| 921 | + with olefile.OleFileIO(filepath, path_encoding=None) as ole: | |
| 922 | + return process_doc(ole) | |
| 918 | 923 | |
| 919 | 924 | with open(filepath, 'rb') as file_handle: |
| 920 | 925 | if file_handle.read(4) == RTF_START: |
| ... | ... | @@ -970,6 +975,7 @@ def process_maybe_encrypted(filepath, passwords=None, crypto_nesting=0, |
| 970 | 975 | if not crypto.is_encrypted(filepath): |
| 971 | 976 | return result |
| 972 | 977 | except Exception: |
| 978 | + logger.debug('Ignoring exception:', exc_info=True) | |
| 973 | 979 | if not crypto.is_encrypted(filepath): |
| 974 | 980 | raise |
| 975 | 981 | |
| ... | ... | @@ -997,7 +1003,8 @@ def process_maybe_encrypted(filepath, passwords=None, crypto_nesting=0, |
| 997 | 1003 | try: # (maybe file was not yet created) |
| 998 | 1004 | os.unlink(decrypted_file) |
| 999 | 1005 | except Exception: |
| 1000 | - pass | |
| 1006 | + logger.debug('Ignoring exception closing decrypted file:', | |
| 1007 | + exc_info=True) | |
| 1001 | 1008 | return result |
| 1002 | 1009 | |
| 1003 | 1010 | ... | ... |
oletools/oleobj.py
| ... | ... | @@ -526,29 +526,35 @@ def find_ole_in_ppt(filename): |
| 526 | 526 | can contain the actual embedded file we are looking for (caller will check |
| 527 | 527 | for these). |
| 528 | 528 | """ |
| 529 | - for stream in PptFile(filename).iter_streams(): | |
| 530 | - for record_idx, record in enumerate(stream.iter_records()): | |
| 531 | - if isinstance(record, PptRecordExOleVbaActiveXAtom): | |
| 532 | - ole = None | |
| 533 | - try: | |
| 534 | - data_start = next(record.iter_uncompressed()) | |
| 535 | - if data_start[:len(olefile.MAGIC)] != olefile.MAGIC: | |
| 536 | - continue # could be an ActiveX control or VBA Storage | |
| 537 | - | |
| 538 | - # otherwise, this should be an OLE object | |
| 539 | - log.debug('Found record with embedded ole object in ppt ' | |
| 540 | - '(stream "{0}", record no {1})' | |
| 541 | - .format(stream.name, record_idx)) | |
| 542 | - ole = record.get_data_as_olefile() | |
| 543 | - yield ole | |
| 544 | - except IOError: | |
| 545 | - log.warning('Error reading data from {0} stream or ' | |
| 546 | - 'interpreting it as OLE object' | |
| 547 | - .format(stream.name)) | |
| 548 | - log.debug('', exc_info=True) | |
| 549 | - finally: | |
| 550 | - if ole is not None: | |
| 551 | - ole.close() | |
| 529 | + ppt_file = None | |
| 530 | + try: | |
| 531 | + ppt_file = PptFile(filename) | |
| 532 | + for stream in ppt_file.iter_streams(): | |
| 533 | + for record_idx, record in enumerate(stream.iter_records()): | |
| 534 | + if isinstance(record, PptRecordExOleVbaActiveXAtom): | |
| 535 | + ole = None | |
| 536 | + try: | |
| 537 | + data_start = next(record.iter_uncompressed()) | |
| 538 | + if data_start[:len(olefile.MAGIC)] != olefile.MAGIC: | |
| 539 | + continue # could be ActiveX control / VBA Storage | |
| 540 | + | |
| 541 | + # otherwise, this should be an OLE object | |
| 542 | + log.debug('Found record with embedded ole object in ' | |
| 543 | + 'ppt (stream "{0}", record no {1})' | |
| 544 | + .format(stream.name, record_idx)) | |
| 545 | + ole = record.get_data_as_olefile() | |
| 546 | + yield ole | |
| 547 | + except IOError: | |
| 548 | + log.warning('Error reading data from {0} stream or ' | |
| 549 | + 'interpreting it as OLE object' | |
| 550 | + .format(stream.name)) | |
| 551 | + log.debug('', exc_info=True) | |
| 552 | + finally: | |
| 553 | + if ole is not None: | |
| 554 | + ole.close() | |
| 555 | + finally: | |
| 556 | + if ppt_file is not None: | |
| 557 | + ppt_file.close() | |
| 552 | 558 | |
| 553 | 559 | |
| 554 | 560 | class FakeFile(io.RawIOBase): | ... | ... |
oletools/ppt_record_parser.py
| ... | ... | @@ -63,7 +63,6 @@ except ImportError: |
| 63 | 63 | sys.path.insert(0, PARENT_DIR) |
| 64 | 64 | del PARENT_DIR |
| 65 | 65 | from oletools import record_base |
| 66 | -from oletools.common.errors import CryptoErrorBase | |
| 67 | 66 | |
| 68 | 67 | |
| 69 | 68 | # types of relevant records (there are much more than listed here) |
| ... | ... | @@ -109,10 +108,11 @@ RECORD_TYPES = dict([ |
| 109 | 108 | ]) |
| 110 | 109 | |
| 111 | 110 | |
| 112 | -# record types where version is not 0x0 or 0xf | |
| 111 | +# record types where version is not 0x0 or 0x1 or 0xf | |
| 113 | 112 | VERSION_EXCEPTIONS = dict([ |
| 114 | 113 | (0x0400, 2), # rt_vbainfoatom |
| 115 | 114 | (0x03ef, 2), # rt_slideatom |
| 115 | + (0xe9c7, 7), # tests/test-data/encrypted/encrypted.ppt, not investigated | |
| 116 | 116 | ]) |
| 117 | 117 | |
| 118 | 118 | |
| ... | ... | @@ -174,7 +174,7 @@ def is_ppt(filename): |
| 174 | 174 | for record in stream.iter_records(): |
| 175 | 175 | if record.type == 0x0ff5: # UserEditAtom |
| 176 | 176 | have_user_edit = True |
| 177 | - elif record.type == 0x1772: # PersisDirectoryAtom | |
| 177 | + elif record.type == 0x1772: # PersistDirectoryAtom | |
| 178 | 178 | have_persist_dir = True |
| 179 | 179 | elif record.type == 0x03e8: # DocumentContainer |
| 180 | 180 | have_document_container = True |
| ... | ... | @@ -185,10 +185,12 @@ def is_ppt(filename): |
| 185 | 185 | return True |
| 186 | 186 | else: # ignore other streams/storages since they are optional |
| 187 | 187 | continue |
| 188 | - except CryptoErrorBase: | |
| 189 | - raise | |
| 190 | - except Exception: | |
| 191 | - pass | |
| 188 | + except Exception as exc: | |
| 189 | + logging.debug('Ignoring exception in is_ppt, assume is not ppt', | |
| 190 | + exc_info=True) | |
| 191 | + finally: | |
| 192 | + if ppt_file is not None: | |
| 193 | + ppt_file.close() | |
| 192 | 194 | return False |
| 193 | 195 | |
| 194 | 196 | ... | ... |
oletools/xls_parser.py
| ... | ... | @@ -88,12 +88,18 @@ def is_xls(filename): |
| 88 | 88 | substream. |
| 89 | 89 | See also: oleid.OleID.check_excel |
| 90 | 90 | """ |
| 91 | + xls_file = None | |
| 91 | 92 | try: |
| 92 | - for stream in XlsFile(filename).iter_streams(): | |
| 93 | + xls_file = XlsFile(filename) | |
| 94 | + for stream in xls_file.iter_streams(): | |
| 93 | 95 | if isinstance(stream, WorkbookStream): |
| 94 | 96 | return True |
| 95 | 97 | except Exception: |
| 96 | - pass | |
| 98 | + logging.debug('Ignoring exception in is_xls, assume is not xls', | |
| 99 | + exc_info=True) | |
| 100 | + finally: | |
| 101 | + if xls_file is not None: | |
| 102 | + xls_file.close() | |
| 97 | 103 | return False |
| 98 | 104 | |
| 99 | 105 | ... | ... |
tests/msodde/test_basic.py
| ... | ... | @@ -9,11 +9,14 @@ Ensure that |
| 9 | 9 | from __future__ import print_function |
| 10 | 10 | |
| 11 | 11 | import unittest |
| 12 | -from oletools import msodde | |
| 13 | -from tests.test_utils import DATA_BASE_DIR as BASE_DIR | |
| 12 | +import sys | |
| 14 | 13 | import os |
| 15 | 14 | from os.path import join |
| 16 | 15 | from traceback import print_exc |
| 16 | +from oletools import msodde | |
| 17 | +from oletools.crypto import \ | |
| 18 | + WrongEncryptionPassword, CryptoLibNotImported, check_msoffcrypto | |
| 19 | +from tests.test_utils import DATA_BASE_DIR as BASE_DIR | |
| 17 | 20 | |
| 18 | 21 | |
| 19 | 22 | class TestReturnCode(unittest.TestCase): |
| ... | ... | @@ -46,15 +49,21 @@ class TestReturnCode(unittest.TestCase): |
| 46 | 49 | |
| 47 | 50 | def test_invalid_none(self): |
| 48 | 51 | """ check that no file argument leads to non-zero exit status """ |
| 49 | - self.do_test_validity('', True) | |
| 52 | + if sys.hexversion > 0x03030000: # version 3.3 and higher | |
| 53 | + # different errors probably depending on whether msoffcryto is | |
| 54 | + # available or not | |
| 55 | + expect_error = (AttributeError, FileNotFoundError) | |
| 56 | + else: | |
| 57 | + expect_error = (AttributeError, IOError) | |
| 58 | + self.do_test_validity('', expect_error) | |
| 50 | 59 | |
| 51 | 60 | def test_invalid_empty(self): |
| 52 | 61 | """ check that empty file argument leads to non-zero exit status """ |
| 53 | - self.do_test_validity(join(BASE_DIR, 'basic/empty'), True) | |
| 62 | + self.do_test_validity(join(BASE_DIR, 'basic/empty'), Exception) | |
| 54 | 63 | |
| 55 | 64 | def test_invalid_text(self): |
| 56 | 65 | """ check that text file argument leads to non-zero exit status """ |
| 57 | - self.do_test_validity(join(BASE_DIR, 'basic/text'), True) | |
| 66 | + self.do_test_validity(join(BASE_DIR, 'basic/text'), Exception) | |
| 58 | 67 | |
| 59 | 68 | def test_encrypted(self): |
| 60 | 69 | """ |
| ... | ... | @@ -64,28 +73,38 @@ class TestReturnCode(unittest.TestCase): |
| 64 | 73 | Encryption) is tested. |
| 65 | 74 | """ |
| 66 | 75 | CRYPT_DIR = join(BASE_DIR, 'encrypted') |
| 67 | - ADD_ARGS = '', '-j', '-d', '-f', '-a' | |
| 76 | + have_crypto = check_msoffcrypto() | |
| 68 | 77 | for filename in os.listdir(CRYPT_DIR): |
| 69 | - full_name = join(CRYPT_DIR, filename) | |
| 70 | - for args in ADD_ARGS: | |
| 71 | - self.do_test_validity(args + ' ' + full_name, True) | |
| 72 | - | |
| 73 | - def do_test_validity(self, args, expect_error=False): | |
| 74 | - """ helper for test_valid_doc[x] """ | |
| 75 | - have_exception = False | |
| 78 | + if have_crypto and 'standardpassword' in filename: | |
| 79 | + # these are automagically decrypted | |
| 80 | + self.do_test_validity(join(CRYPT_DIR, filename)) | |
| 81 | + elif have_crypto: | |
| 82 | + self.do_test_validity(join(CRYPT_DIR, filename), | |
| 83 | + WrongEncryptionPassword) | |
| 84 | + else: | |
| 85 | + self.do_test_validity(join(CRYPT_DIR, filename), | |
| 86 | + CryptoLibNotImported) | |
| 87 | + | |
| 88 | + def do_test_validity(self, filename, expect_error=None): | |
| 89 | + """ helper for test_[in]valid_* """ | |
| 90 | + found_error = None | |
| 91 | + # DEBUG: print('Testing file {}'.format(filename)) | |
| 76 | 92 | try: |
| 77 | - msodde.process_file(args, msodde.FIELD_FILTER_BLACKLIST) | |
| 78 | - except Exception: | |
| 79 | - have_exception = True | |
| 80 | - print_exc() | |
| 81 | - except SystemExit as exc: # sys.exit() was called | |
| 82 | - have_exception = True | |
| 83 | - if exc.code is None: | |
| 84 | - have_exception = False | |
| 85 | - | |
| 86 | - self.assertEqual(expect_error, have_exception, | |
| 87 | - msg='Args={0}, expect={1}, exc={2}' | |
| 88 | - .format(args, expect_error, have_exception)) | |
| 93 | + msodde.process_maybe_encrypted(filename, | |
| 94 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 95 | + except Exception as exc: | |
| 96 | + found_error = exc | |
| 97 | + # DEBUG: print_exc() | |
| 98 | + | |
| 99 | + if expect_error and not found_error: | |
| 100 | + self.fail('Expected {} but msodde finished without errors for {}' | |
| 101 | + .format(expect_error, filename)) | |
| 102 | + elif not expect_error and found_error: | |
| 103 | + self.fail('Unexpected error {} from msodde for {}' | |
| 104 | + .format(found_error, filename)) | |
| 105 | + elif expect_error and not isinstance(found_error, expect_error): | |
| 106 | + self.fail('Wrong kind of error {} from msodde for {}, expected {}' | |
| 107 | + .format(type(found_error), filename, expect_error)) | |
| 89 | 108 | |
| 90 | 109 | |
| 91 | 110 | class TestDdeLinks(unittest.TestCase): |
| ... | ... | @@ -100,24 +119,27 @@ class TestDdeLinks(unittest.TestCase): |
| 100 | 119 | def test_with_dde(self): |
| 101 | 120 | """ check that dde links appear on stdout """ |
| 102 | 121 | filename = 'dde-test-from-office2003.doc' |
| 103 | - output = msodde.process_file( | |
| 104 | - join(BASE_DIR, 'msodde', filename), msodde.FIELD_FILTER_BLACKLIST) | |
| 122 | + output = msodde.process_maybe_encrypted( | |
| 123 | + join(BASE_DIR, 'msodde', filename), | |
| 124 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 105 | 125 | self.assertNotEqual(len(self.get_dde_from_output(output)), 0, |
| 106 | 126 | msg='Found no dde links in output of ' + filename) |
| 107 | 127 | |
| 108 | 128 | def test_no_dde(self): |
| 109 | 129 | """ check that no dde links appear on stdout """ |
| 110 | 130 | filename = 'harmless-clean.doc' |
| 111 | - output = msodde.process_file( | |
| 112 | - join(BASE_DIR, 'msodde', filename), msodde.FIELD_FILTER_BLACKLIST) | |
| 131 | + output = msodde.process_maybe_encrypted( | |
| 132 | + join(BASE_DIR, 'msodde', filename), | |
| 133 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 113 | 134 | self.assertEqual(len(self.get_dde_from_output(output)), 0, |
| 114 | 135 | msg='Found dde links in output of ' + filename) |
| 115 | 136 | |
| 116 | 137 | def test_with_dde_utf16le(self): |
| 117 | 138 | """ check that dde links appear on stdout """ |
| 118 | 139 | filename = 'dde-test-from-office2013-utf_16le-korean.doc' |
| 119 | - output = msodde.process_file( | |
| 120 | - join(BASE_DIR, 'msodde', filename), msodde.FIELD_FILTER_BLACKLIST) | |
| 140 | + output = msodde.process_maybe_encrypted( | |
| 141 | + join(BASE_DIR, 'msodde', filename), | |
| 142 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 121 | 143 | self.assertNotEqual(len(self.get_dde_from_output(output)), 0, |
| 122 | 144 | msg='Found no dde links in output of ' + filename) |
| 123 | 145 | |
| ... | ... | @@ -125,8 +147,9 @@ class TestDdeLinks(unittest.TestCase): |
| 125 | 147 | """ check that dde links are found in excel 2007+ files """ |
| 126 | 148 | expect = ['cmd /c calc.exe', ] |
| 127 | 149 | for extn in 'xlsx', 'xlsm', 'xlsb': |
| 128 | - output = msodde.process_file( | |
| 129 | - join(BASE_DIR, 'msodde', 'dde-test.' + extn), msodde.FIELD_FILTER_BLACKLIST) | |
| 150 | + output = msodde.process_maybe_encrypted( | |
| 151 | + join(BASE_DIR, 'msodde', 'dde-test.' + extn), | |
| 152 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 130 | 153 | |
| 131 | 154 | self.assertEqual(expect, self.get_dde_from_output(output), |
| 132 | 155 | msg='unexpected output for dde-test.{0}: {1}' |
| ... | ... | @@ -136,8 +159,9 @@ class TestDdeLinks(unittest.TestCase): |
| 136 | 159 | """ check that dde in xml from word / excel is found """ |
| 137 | 160 | for name_part in 'excel2003', 'word2003', 'word2007': |
| 138 | 161 | filename = 'dde-in-' + name_part + '.xml' |
| 139 | - output = msodde.process_file( | |
| 140 | - join(BASE_DIR, 'msodde', filename), msodde.FIELD_FILTER_BLACKLIST) | |
| 162 | + output = msodde.process_maybe_encrypted( | |
| 163 | + join(BASE_DIR, 'msodde', filename), | |
| 164 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 141 | 165 | links = self.get_dde_from_output(output) |
| 142 | 166 | self.assertEqual(len(links), 1, 'found {0} dde-links in {1}' |
| 143 | 167 | .format(len(links), filename)) |
| ... | ... | @@ -149,15 +173,17 @@ class TestDdeLinks(unittest.TestCase): |
| 149 | 173 | def test_clean_rtf_blacklist(self): |
| 150 | 174 | """ find a lot of hyperlinks in rtf spec """ |
| 151 | 175 | filename = 'RTF-Spec-1.7.rtf' |
| 152 | - output = msodde.process_file( | |
| 153 | - join(BASE_DIR, 'msodde', filename), msodde.FIELD_FILTER_BLACKLIST) | |
| 176 | + output = msodde.process_maybe_encrypted( | |
| 177 | + join(BASE_DIR, 'msodde', filename), | |
| 178 | + field_filter_mode=msodde.FIELD_FILTER_BLACKLIST) | |
| 154 | 179 | self.assertEqual(len(self.get_dde_from_output(output)), 1413) |
| 155 | 180 | |
| 156 | 181 | def test_clean_rtf_ddeonly(self): |
| 157 | 182 | """ find no dde links in rtf spec """ |
| 158 | 183 | filename = 'RTF-Spec-1.7.rtf' |
| 159 | - output = msodde.process_file( | |
| 160 | - join(BASE_DIR, 'msodde', filename), msodde.FIELD_FILTER_DDE) | |
| 184 | + output = msodde.process_maybe_encrypted( | |
| 185 | + join(BASE_DIR, 'msodde', filename), | |
| 186 | + field_filter_mode=msodde.FIELD_FILTER_DDE) | |
| 161 | 187 | self.assertEqual(len(self.get_dde_from_output(output)), 0, |
| 162 | 188 | msg='Found dde links in output of ' + filename) |
| 163 | 189 | ... | ... |
tests/msodde/test_crypto.py
| ... | ... | @@ -4,10 +4,9 @@ import sys |
| 4 | 4 | import unittest |
| 5 | 5 | from os.path import basename, join as pjoin |
| 6 | 6 | |
| 7 | -from tests.test_utils import DATA_BASE_DIR | |
| 7 | +from tests.test_utils import DATA_BASE_DIR, call_and_capture | |
| 8 | 8 | |
| 9 | 9 | from oletools import crypto |
| 10 | -from oletools import msodde | |
| 11 | 10 | |
| 12 | 11 | |
| 13 | 12 | @unittest.skipIf(not crypto.check_msoffcrypto(), |
| ... | ... | @@ -15,15 +14,18 @@ from oletools import msodde |
| 15 | 14 | .format(basename(sys.executable))) |
| 16 | 15 | class MsoddeCryptoTest(unittest.TestCase): |
| 17 | 16 | """Test integration of decryption in msodde.""" |
| 17 | + | |
| 18 | 18 | def test_standard_password(self): |
| 19 | 19 | """Check dde-link is found in xls[mb] sample files.""" |
| 20 | 20 | for suffix in 'xls', 'xlsx', 'xlsm', 'xlsb': |
| 21 | 21 | example_file = pjoin(DATA_BASE_DIR, 'encrypted', |
| 22 | 22 | 'dde-test-encrypt-standardpassword.' + suffix) |
| 23 | - link_text = msodde.process_maybe_encrypted(example_file) | |
| 24 | - self.assertEqual(link_text, 'cmd /c calc.exe', | |
| 25 | - msg='Unexpected output {!r} for {}' | |
| 26 | - .format(link_text, suffix)) | |
| 23 | + output, _ = call_and_capture('msodde', [example_file, ]) | |
| 24 | + self.assertIn('\nDDE Links:\ncmd /c calc.exe\n', output, | |
| 25 | + msg='Unexpected output {!r} for {}' | |
| 26 | + .format(output, suffix)) | |
| 27 | + | |
| 28 | + # TODO: add more, in particular a sample with a "proper" password | |
| 27 | 29 | |
| 28 | 30 | |
| 29 | 31 | if __name__ == '__main__': | ... | ... |
tests/oleobj/test_basic.py
| ... | ... | @@ -8,7 +8,7 @@ from hashlib import md5 |
| 8 | 8 | from glob import glob |
| 9 | 9 | |
| 10 | 10 | # Directory with test data, independent of current working directory |
| 11 | -from tests.test_utils import DATA_BASE_DIR | |
| 11 | +from tests.test_utils import DATA_BASE_DIR, call_and_capture | |
| 12 | 12 | from oletools import oleobj |
| 13 | 13 | |
| 14 | 14 | |
| ... | ... | @@ -81,10 +81,6 @@ class TestOleObj(unittest.TestCase): |
| 81 | 81 | """ fixture start: create temp dir """ |
| 82 | 82 | self.temp_dir = mkdtemp(prefix='oletools-oleobj-') |
| 83 | 83 | self.did_fail = False |
| 84 | - if DEBUG: | |
| 85 | - import logging | |
| 86 | - logging.basicConfig(level=logging.DEBUG if DEBUG else logging.INFO) | |
| 87 | - oleobj.log.setLevel(logging.NOTSET) | |
| 88 | 84 | |
| 89 | 85 | def tearDown(self): |
| 90 | 86 | """ fixture end: remove temp dir """ |
| ... | ... | @@ -101,7 +97,8 @@ class TestOleObj(unittest.TestCase): |
| 101 | 97 | """ |
| 102 | 98 | test that oleobj can be called with -i and -v |
| 103 | 99 | |
| 104 | - this is the way that amavisd calls oleobj, thinking it is ripOLE | |
| 100 | + This is how ripOLE used to be often called (e.g. by amavisd-new); | |
| 101 | + ensure oleobj is a compatible replacement. | |
| 105 | 102 | """ |
| 106 | 103 | self.do_test_md5(['-d', self.temp_dir, '-v', '-i']) |
| 107 | 104 | |
| ... | ... | @@ -112,35 +109,52 @@ class TestOleObj(unittest.TestCase): |
| 112 | 109 | 'embedded-simple-2007.xml', |
| 113 | 110 | 'embedded-simple-2007-as2003.xml'): |
| 114 | 111 | full_name = join(DATA_BASE_DIR, 'oleobj', sample_name) |
| 115 | - ret_val = oleobj.main(args + [full_name, ]) | |
| 112 | + output, ret_val = call_and_capture('oleobj', args + [full_name, ], | |
| 113 | + accept_nonzero_exit=True) | |
| 116 | 114 | if glob(self.temp_dir + 'ole-object-*'): |
| 117 | - self.fail('found embedded data in {0}'.format(sample_name)) | |
| 118 | - self.assertEqual(ret_val, oleobj.RETURN_NO_DUMP) | |
| 115 | + self.fail('found embedded data in {0}. Output:\n{1}' | |
| 116 | + .format(sample_name, output)) | |
| 117 | + self.assertEqual(ret_val, oleobj.RETURN_NO_DUMP, | |
| 118 | + msg='Wrong return value {} for {}. Output:\n{}' | |
| 119 | + .format(ret_val, sample_name, output)) | |
| 119 | 120 | |
| 120 | - def do_test_md5(self, args, test_fun=oleobj.main): | |
| 121 | + def do_test_md5(self, args, test_fun=None, only_run_every=1): | |
| 121 | 122 | """ helper for test_md5 and test_md5_args """ |
| 122 | - # name of sample, extension of embedded file, md5 hash of embedded file | |
| 123 | 123 | data_dir = join(DATA_BASE_DIR, 'oleobj') |
| 124 | - for sample_name, embedded_name, expect_hash in SAMPLES: | |
| 125 | - ret_val = test_fun(args + [join(data_dir, sample_name), ]) | |
| 126 | - self.assertEqual(ret_val, oleobj.RETURN_DID_DUMP) | |
| 124 | + | |
| 125 | + # name of sample, extension of embedded file, md5 hash of embedded file | |
| 126 | + for sample_index, (sample_name, embedded_name, expect_hash) \ | |
| 127 | + in enumerate(SAMPLES): | |
| 128 | + if sample_index % only_run_every != 0: | |
| 129 | + continue | |
| 130 | + args_with_path = args + [join(data_dir, sample_name), ] | |
| 131 | + if test_fun is None: | |
| 132 | + output, ret_val = call_and_capture('oleobj', args_with_path, | |
| 133 | + accept_nonzero_exit=True) | |
| 134 | + else: | |
| 135 | + ret_val = test_fun(args_with_path) | |
| 136 | + output = '[output: see above]' | |
| 137 | + self.assertEqual(ret_val, oleobj.RETURN_DID_DUMP, | |
| 138 | + msg='Wrong return value {} for {}. Output:\n{}' | |
| 139 | + .format(ret_val, sample_name, output)) | |
| 127 | 140 | expect_name = join(self.temp_dir, |
| 128 | 141 | sample_name + '_' + embedded_name) |
| 129 | 142 | if not isfile(expect_name): |
| 130 | 143 | self.did_fail = True |
| 131 | - self.fail('{0} not created from {1}'.format(expect_name, | |
| 132 | - sample_name)) | |
| 144 | + self.fail('{0} not created from {1}. Output:\n{2}' | |
| 145 | + .format(expect_name, sample_name, output)) | |
| 133 | 146 | continue |
| 134 | 147 | md5_hash = calc_md5(expect_name) |
| 135 | 148 | if md5_hash != expect_hash: |
| 136 | 149 | self.did_fail = True |
| 137 | - self.fail('Wrong md5 {0} of {1} from {2}' | |
| 138 | - .format(md5_hash, expect_name, sample_name)) | |
| 150 | + self.fail('Wrong md5 {0} of {1} from {2}. Output:\n{3}' | |
| 151 | + .format(md5_hash, expect_name, sample_name, output)) | |
| 139 | 152 | continue |
| 140 | 153 | |
| 141 | 154 | def test_non_streamed(self): |
| 142 | 155 | """ Ensure old oleobj behaviour still works: pre-read whole file """ |
| 143 | - return self.do_test_md5(['-d', self.temp_dir], test_fun=preread_file) | |
| 156 | + return self.do_test_md5(['-d', self.temp_dir], test_fun=preread_file, | |
| 157 | + only_run_every=4) | |
| 144 | 158 | |
| 145 | 159 | |
| 146 | 160 | # just in case somebody calls this file as a script | ... | ... |
tests/oleobj/test_external_links.py
| ... | ... | @@ -6,7 +6,7 @@ import os |
| 6 | 6 | from os import path |
| 7 | 7 | |
| 8 | 8 | # Directory with test data, independent of current working directory |
| 9 | -from tests.test_utils import DATA_BASE_DIR | |
| 9 | +from tests.test_utils import DATA_BASE_DIR, call_and_capture | |
| 10 | 10 | from oletools import oleobj |
| 11 | 11 | |
| 12 | 12 | BASE_DIR = path.join(DATA_BASE_DIR, 'oleobj', 'external_link') |
| ... | ... | @@ -22,8 +22,11 @@ class TestExternalLinks(unittest.TestCase): |
| 22 | 22 | for filename in filenames: |
| 23 | 23 | file_path = path.join(dirpath, filename) |
| 24 | 24 | |
| 25 | - ret_val = oleobj.main([file_path]) | |
| 26 | - self.assertEqual(ret_val, oleobj.RETURN_DID_DUMP) | |
| 25 | + output, ret_val = call_and_capture('oleobj', [file_path, ], | |
| 26 | + accept_nonzero_exit=True) | |
| 27 | + self.assertEqual(ret_val, oleobj.RETURN_DID_DUMP, | |
| 28 | + msg='Wrong return value {} for {}. Output:\n{}' | |
| 29 | + .format(ret_val, filename, output)) | |
| 27 | 30 | |
| 28 | 31 | |
| 29 | 32 | # just in case somebody calls this file as a script | ... | ... |
tests/ooxml/test_zip_sub_file.py
| ... | ... | @@ -144,15 +144,15 @@ class TestZipSubFile(unittest.TestCase): |
| 144 | 144 | self.subfile.seek(0, os.SEEK_END) |
| 145 | 145 | self.compare.seek(0, os.SEEK_END) |
| 146 | 146 | |
| 147 | - self.assertEquals(self.compare.read(10), self.subfile.read(10)) | |
| 148 | - self.assertEquals(self.compare.tell(), self.subfile.tell()) | |
| 147 | + self.assertEqual(self.compare.read(10), self.subfile.read(10)) | |
| 148 | + self.assertEqual(self.compare.tell(), self.subfile.tell()) | |
| 149 | 149 | |
| 150 | 150 | self.subfile.seek(0) |
| 151 | 151 | self.compare.seek(0) |
| 152 | 152 | self.subfile.seek(len(FILE_CONTENTS) - 1) |
| 153 | 153 | self.compare.seek(len(FILE_CONTENTS) - 1) |
| 154 | - self.assertEquals(self.compare.read(10), self.subfile.read(10)) | |
| 155 | - self.assertEquals(self.compare.tell(), self.subfile.tell()) | |
| 154 | + self.assertEqual(self.compare.read(10), self.subfile.read(10)) | |
| 155 | + self.assertEqual(self.compare.tell(), self.subfile.tell()) | |
| 156 | 156 | |
| 157 | 157 | def test_error_seek(self): |
| 158 | 158 | """ test correct behaviour if seek beyond end (no exception) """ | ... | ... |
tests/test_utils/utils.py
| ... | ... | @@ -47,6 +47,13 @@ def call_and_capture(module, args=None, accept_nonzero_exit=False, |
| 47 | 47 | except KeyError: |
| 48 | 48 | env['PYTHONPATH'] = SOURCE_BASE_DIR |
| 49 | 49 | |
| 50 | + # hack: in python2 output encoding (sys.stdout.encoding) was None | |
| 51 | + # although sys.getdefaultencoding() and sys.getfilesystemencoding were ok | |
| 52 | + # TODO: maybe can remove this once branch | |
| 53 | + # "encoding-for-non-unicode-environments" is merged | |
| 54 | + if 'PYTHONIOENCODING' not in env: | |
| 55 | + env['PYTHONIOENCODING'] = 'utf8' | |
| 56 | + | |
| 50 | 57 | # ensure args is a tuple |
| 51 | 58 | my_args = tuple(args) if args else () |
| 52 | 59 | ... | ... |