]> git.saurik.com Git - apt.git/blame_incremental - test/integration/test-cve-2013-1051-InRelease-parsing
correct cross & disappear progress detection
[apt.git] / test / integration / test-cve-2013-1051-InRelease-parsing
... / ...
CommitLineData
1#!/bin/sh
2set -e
3
4TESTDIR="$(readlink -f "$(dirname "$0")")"
5. "$TESTDIR/framework"
6
7setupenvironment
8configarchitecture 'i386'
9
10insertpackage 'stable' 'good-pkg' 'all' '1.0'
11
12setupaptarchive
13
14changetowebserver
15ARCHIVE="http://localhost:${APTHTTPPORT}"
16msgtest 'Initial apt-get update should work with' 'InRelease'
17testsuccess --nomsg aptget update
18
19# check that the setup is correct
20testsuccessequal "good-pkg:
21 Installed: (none)
22 Candidate: 1.0
23 Version table:
24 1.0 500
25 500 ${ARCHIVE} stable/main all Packages" aptcache policy good-pkg
26
27# now exchange to the Packages file, note that this could be
28# done via MITM too
29insertpackage 'stable' 'bad-mitm' 'all' '1.0'
30
31# this builds compressed files and a new (unsigned) Release
32buildaptarchivefromfiles '+1hour'
33
34# add a space into the BEGIN PGP SIGNATURE PART/END PGP SIGNATURE part
35# to trick apt - this is still legal to gpg(v)
36sed -i '/^-----BEGIN PGP SIGNATURE-----/,/^-----END PGP SIGNATURE-----/ s/^$/ /g' aptarchive/dists/stable/InRelease
37
38# we append the (evil unsigned) Release file to the (good signed) InRelease
39cat aptarchive/dists/stable/Release >> aptarchive/dists/stable/InRelease
40touch -d '+1hour' aptarchive/dists/stable/InRelease
41
42# ensure the update doesn't load bad data as good data
43# Note that we will pick up the InRelease itself as we download no other
44# indexes which would trigger a hashsum mismatch, but we ignore the 'bad'
45# part of the InRelease
46listcurrentlistsdirectory | sed '/_InRelease/ d' > listsdir.lst
47msgtest 'apt-get update should ignore unsigned data in the' 'InRelease'
48testsuccessequal "Get:1 http://localhost:${APTHTTPPORT} stable InRelease [$(stat -c%s aptarchive/dists/stable/InRelease) B]
49Reading package lists..." --nomsg aptget update
50testfileequal './listsdir.lst' "$(listcurrentlistsdirectory | sed '/_InRelease/ d')"
51
52# ensure there is no package
53testfailureequal 'Reading package lists...
54Building dependency tree...
55E: Unable to locate package bad-mitm' aptget install bad-mitm -s
56
57# and verify that its not picked up
58testsuccessequal 'N: Unable to locate package bad-mitm' aptcache policy bad-mitm
59
60# and that the right one is used
61testsuccessequal "good-pkg:
62 Installed: (none)
63 Candidate: 1.0
64 Version table:
65 1.0 500
66 500 ${ARCHIVE} stable/main all Packages" aptcache policy good-pkg