mirror of https://github.com/secdev/scapy.git
102 lines
2.8 KiB
Bash
102 lines
2.8 KiB
Bash
# Report installed versions
|
|
echo "### INSTALLED VERSIONS ###"
|
|
python -c 'import sys; print("sys.path:" , sys.path)'
|
|
for DEPENDENCY in "six" "cryptography" "mock" "pcap" "dumbnet" "coverage"
|
|
do
|
|
python -c 'import '$DEPENDENCY'; print("'$DEPENDENCY': "+str(getattr('$DEPENDENCY', "__version__", "no __version__ attribute")))'
|
|
echo "----"
|
|
done
|
|
|
|
# Dump environment variables
|
|
echo "SCAPY_SUDO=" $SCAPY_SUDO
|
|
echo "TRAVIS_OS_NAME=" $TRAVIS_OS_NAME
|
|
|
|
# Dump Scapy config
|
|
python --version
|
|
python -c "from scapy.all import *; print(conf)"
|
|
|
|
# Don't run tests that require root privileges
|
|
if [ -z "$SCAPY_SUDO" -o "$SCAPY_SUDO" = "false" ]
|
|
then
|
|
UT_FLAGS="-K netaccess -K needs_root -K manufdb"
|
|
SCAPY_SUDO=""
|
|
else
|
|
SCAPY_SUDO="$SCAPY_SUDO -H"
|
|
fi
|
|
|
|
if [ "$SCAPY_USE_PCAPDNET" = "yes" ]
|
|
then
|
|
UT_FLAGS+=" -K not_pcapdnet"
|
|
fi
|
|
# IPv6 is not available yet on travis
|
|
UT_FLAGS+=" -K ipv6"
|
|
|
|
# AES-CCM, ChaCha20Poly1305 and X25519 were added to Cryptography v2.0
|
|
# but the minimal version mandated by scapy is v1.7
|
|
UT_FLAGS+=" -K crypto_advanced"
|
|
|
|
if python --version 2>&1 | grep -q PyPy
|
|
then
|
|
# cryptography requires PyPy >= 2.6, Travis CI uses 2.5.0
|
|
UT_FLAGS+=" -K crypto -K not_pypy"
|
|
fi
|
|
|
|
# Set PATH
|
|
for _path in /sbin /usr/sbin /usr/local/sbin; do
|
|
[ -d "$_path" ] && echo "$PATH" | grep -qvE "(^|:)$_path(:|$)" && export PATH="$PATH:$_path"
|
|
done
|
|
|
|
# Create a fake Python executable
|
|
if [ "$SCAPY_COVERAGE" = "yes" ]
|
|
then
|
|
echo '#!/bin/bash' > test/python
|
|
echo '[ "$*" = "--version" ] && echo "Python 2 - fake version string" && exit 0' >> test/python
|
|
echo "`which coverage` run --concurrency=multiprocessing -a \$*" >> test/python
|
|
chmod +x test/python
|
|
PATH=.:$PATH
|
|
|
|
# Copy the fake Python interpreter to bypass /etc/sudoers rules on Ubuntu
|
|
if [ -n "$SCAPY_SUDO" ]
|
|
then
|
|
$SCAPY_SUDO cp test/python /usr/local/sbin/
|
|
fi
|
|
fi
|
|
|
|
# Do we have tcpdump or thsark?
|
|
which tcpdump >/dev/null 2>&1 || UT_FLAGS+=" -K tcpdump"
|
|
which tshark >/dev/null 2>&1 || UT_FLAGS+=" -K tshark"
|
|
|
|
if [ -n "$SCAPY_SUDO" ]
|
|
then
|
|
SCAPY_SUDO="$SCAPY_SUDO --preserve-env"
|
|
fi
|
|
|
|
# Dump Environment (so that we can check PATH, UT_FLAGS, etc.)
|
|
set
|
|
|
|
# Run unit tests
|
|
cd test/
|
|
|
|
if [ "$TRAVIS_OS_NAME" = "osx" ]
|
|
then
|
|
if [ -z "$SCAPY_USE_PCAPDNET" ]
|
|
then
|
|
PYTHON=`which python` $SCAPY_SUDO ./run_tests -q -F -t bpf.uts $UT_FLAGS || exit $?
|
|
fi
|
|
UT_FLAGS+=" -K manufdb -K linux"
|
|
fi
|
|
|
|
if [ "$TRAVIS_OS_NAME" = "linux" ]
|
|
then
|
|
UT_FLAGS+=" -K osx"
|
|
fi
|
|
|
|
# Run all normal and contrib tests
|
|
PYTHON=`which python` $SCAPY_SUDO ./run_tests -c ./configs/travis.utsc -T "bpf.uts" -T "mock_windows.uts" $UT_FLAGS || exit $?
|
|
|
|
# Run unit tests with openssl if we have root privileges
|
|
if [ "$TRAVIS_OS_NAME" = "linux" ] && [ -n "$SCAPY_USE_PCAPDNET" ] && [ -n "$SCAPY_SUDO" ]
|
|
then
|
|
PYTHON=`which python` $SCAPY_SUDO ./run_tests -q -F -t tls/tests_tls_netaccess.uts $UT_FLAGS || exit $?
|
|
fi
|