PyCIRCLean/.travis.yml

91 lines
2.9 KiB
YAML
Raw Normal View History

language: python
python:
- 3.3
- 3.4
- 3.5
2017-04-13 23:03:50 +02:00
- 3.6
- "3.6-dev"
- nightly
2015-10-27 10:59:35 +01:00
sudo: required
# https://docs.travis-ci.com/user/ci-environment/#Virtualization-environments
2015-10-27 10:59:35 +01:00
2015-11-24 15:03:57 +01:00
dist: trusty
2015-10-27 10:59:35 +01:00
addons:
apt:
packages:
2015-11-24 15:03:57 +01:00
# General dependencies
2015-10-27 10:59:35 +01:00
- p7zip-full
2015-11-24 15:03:57 +01:00
# Testing dependencies
2015-11-20 11:47:47 +01:00
- mercurial
2015-10-27 10:59:35 +01:00
install:
2015-11-24 15:03:57 +01:00
# General dependencies
2015-11-24 15:09:27 +01:00
- sudo add-apt-repository "deb http://archive.ubuntu.com/ubuntu/ trusty multiverse" && sudo add-apt-repository "deb http://archive.ubuntu.com/ubuntu/ trusty-updates multiverse"
- sudo apt-get update -qq
- sudo apt-get install -y p7zip-rar python-pip
2015-11-24 15:03:57 +01:00
# filecheck.py dependencies
2016-05-09 17:38:32 +02:00
- sudo apt-get install libxml2-dev libxslt1-dev
2015-11-03 11:54:38 +01:00
- wget https://didierstevens.com/files/software/pdfid_v0_2_1.zip
- unzip pdfid_v0_2_1.zip
- pip install -U pip
2017-08-07 23:17:10 +02:00
- pip install lxml exifread pillow olefile oletools
- pip install git+https://github.com/grierforensics/officedissector.git
# PyCIRCLean dependencies
- pip install -r dev-requirements.txt
- pip install codecov
2015-11-24 15:03:57 +01:00
# Testing dependencies
- sudo apt-get install rar
# Prepare tests
# Malware from theZoo
2017-07-21 00:39:41 +02:00
- git clone https://github.com/Rafiot/theZoo.git
- pushd theZoo/malwares/Binaries
- python unpackall.py
- popd
- mkdir tests/uncategorized/the_zoo/
- mv theZoo/malwares/Binaries/out tests/uncategorized/the_zoo/
# Path traversal attacks
- git clone https://github.com/jwilk/path-traversal-samples
- pushd path-traversal-samples
- pushd zip
- make
- popd
- pushd rar
- make
- popd
- popd
2017-07-20 21:26:10 +02:00
- mkdir tests/uncategorized/path_traversal_zip/
- mkdir tests/uncategorized/path_traversal_rar/
- mv path-traversal-samples/zip/*.zip tests/uncategorized/path_traversal_zip
- mv path-traversal-samples/rar/*.rar tests/uncategorized/path_traversal_rar
2016-02-01 11:45:50 +01:00
# Office docs
2016-05-16 20:15:38 +02:00
- git clone https://github.com/eea/odfpy.git
2017-07-20 21:26:10 +02:00
- mkdir tests/uncategorized/odfpy/
- mv odfpy/tests/examples/* tests/uncategorized/odfpy/
- mkdir tests/uncategorized/olefile
- pushd tests/uncategorized/olefile
2016-05-14 20:03:40 +02:00
- wget https://bitbucket.org/decalage/olefileio_pl/raw/3073963b640935134ed0da34906fea8e506460be/Tests/images/test-ole-file.doc
- popd
2017-07-20 21:26:10 +02:00
- mkdir tests/uncategorized/fraunhofer && pushd tests/uncategorized/fraunhofer
- wget --no-check-certificate https://www.officedissector.com/corpus/fraunhoferlibrary.zip
- unzip -o fraunhoferlibrary.zip
2016-05-11 10:57:18 +02:00
- rm fraunhoferlibrary.zip
- popd
2017-08-07 23:17:10 +02:00
# Turned off unzipping 42.zip because it isn't included in the file catalog and archivebomb.zip ends up testing the same thing
# - pushd tests/dangerous/
# - 7z x -p42 42.zip
# - popd
script:
2017-08-11 00:12:30 +02:00
- travis_wait py.test --cov=kittengroomer --cov=filecheck tests/
2015-11-24 11:32:44 +01:00
notifications:
email:
on_success: change
on_failure: change
after_success:
- codecov