NSIS/SCons/utils.py
anders_k 523b810377 Another Python fix
git-svn-id: https://svn.code.sf.net/p/nsis/code/NSIS/trunk@7215 212acab6-be3b-0410-9dea-997c60f758d6
2020-08-12 23:27:03 +00:00

271 lines
8.3 KiB
Python

def IsExecutingOnWindows():
import sys, os
if sys.platform.startswith('win') or os.name == 'nt': return True
return False
def GetWindowsStdSysEnvVarList(path=False, temp=True, user=True, os=True, shell=True, cpu=True):
ret = []
if os: ret += 'OS WINDIR SYSTEMDRIVE SYSTEMROOT ALLUSERSPROFILE Public ProgramData CommonProgramFiles CommonProgramFiles(x86) CommonProgramW6432 ProgramFiles ProgramFiles(x86) ProgramW6432'.split()
if cpu: ret += 'NUMBER_OF_PROCESSORS PROCESSOR_ARCHITECTURE PROCESSOR_ARCHITEW6432 PROCESSOR_IDENTIFIER PROCESSOR_LEVEL PROCESSOR_REVISION'.split()
if user: ret += 'COMPUTERNAME USERNAME USERPROFILE APPDATA LOCALAPPDATA HOMEDRIVE HOMESHARE HOMEPATH LOGONSERVER USERDNSDOMAIN USERDOMAIN USERDOMAIN_ROAMINGPROFILE ClientName SessionName'.split()
if shell: ret += 'COMSPEC PATHEXT PSModulePath'.split() # PROMPT
if temp: ret += 'TEMP TMP'.split()
if path: ret += 'PATH'.split()
return ret
def GetPosixStdSysEnvVarList(path=False, temp=True, user=True, os=True, shell=True, cpu=True):
ret = []
if os: ret += 'HOSTALIASES'.split()
if user: ret += 'HOME USER LOGNAME DATEMSK UID'.split() # XDG_* TZ LANGUAGE LANG LC_* NLSPATH
if shell: ret += 'SHELL TERM TERMCAP'.split()
if temp: ret += 'TMPDIR'.split()
if path: ret += 'PATH MANPATH'.split()
return ret
def GetStdSysEnvVarList(path=False, temp=True, user=True, os=True, shell=True, cpu=True):
func = GetPosixStdSysEnvVarList
if IsExecutingOnWindows(): func = GetWindowsStdSysEnvVarList
return func(path=path, temp=temp, user=user, os=os, shell=shell, cpu=cpu)
def AddAvailableLibs(env, libs):
"""
Scans through a list of libraries and adds
available libraries to the environment.
"""
conf = env.Configure()
for lib in libs:
conf.CheckLib(lib)
conf.Finish()
def AddZLib(env, platform, alias='install-utils'):
"""
Checks for platform specific zlib and adds the
appropriate compiler and linker options to the environment
"""
zlib = 'z'
if platform == 'win32':
if 'ZLIB_W32' in env:
# Add include and library path of zlib for Win32
env.Append(CPPPATH = env['ZLIB_W32_INC'])
env.Append(LIBPATH = env['ZLIB_W32_LIB'])
zlib = ['zdll', 'z']
if 'ZLIB_W32_DLL' in env and env['ZLIB_W32_DLL']:
env.DistributeW32Bin(env['ZLIB_W32_DLL'], alias=alias)
if 'ZLIB_W32_NEW_DLL' in env and env['ZLIB_W32_NEW_DLL']:
env.DistributeW32Bin(env['ZLIB_W32_NEW_DLL'], alias=alias)
else:
print('Please specify folder of zlib for Win32 via ZLIB_W32')
Exit(1)
# Avoid unnecessary configuring when cleaning targets
# and a clash when scons is run in parallel operation.
if not env.GetOption('clean'):
conf = env.Configure()
if not conf.CheckLibWithHeader(zlib, 'zlib.h', 'c'):
print('zlib (%s) is missing!' % (platform))
Exit(1)
env = conf.Finish()
def GetAvailableLibs(env, libs):
"""
Scans through a list list of libraries and adds
available libraries to the environment.
"""
conf = env.Configure()
avail_libs = []
for lib in libs:
if conf.CheckLib(lib):
avail_libs.append(lib)
conf.Finish()
return avail_libs
def check_compile_flag(ctx, flag):
"""
Checks if a compiler flag is valid.
"""
ctx.Message('Checking for compiler flag %s... ' % flag)
old_flags = ctx.env['CCFLAGS']
ctx.env.Append(CCFLAGS = [flag])
test = """
int main() {
return 0;
}
"""
result = ctx.TryCompile(test, '.c')
ctx.Result(result)
if not result:
ctx.env.Replace(CCFLAGS = [old_flags])
return result
def check_link_flag(ctx, flag, run = 0, extension = '.c', code = None):
"""
Checks if a linker flag is valid.
"""
ctx.Message('Checking for linker flag %s... ' % flag)
old_flags = ctx.env['LINKFLAGS']
ctx.env.Append(LINKFLAGS = [flag])
if code:
test = code
else:
test = """
int main() {
return 0;
}
"""
result = ctx.TryLink(test, extension)
if run:
result = result and ctx.TryRun(test, extension)[0]
ctx.Result(result)
if not result:
ctx.env.Replace(LINKFLAGS = [old_flags])
return result
def FlagsConfigure(env):
"""
Wrapper for env.Configure which adds two new tests:
CheckCompileFlag - checks for a compiler flag
CheckLinkFlag - checks for a linker flag
"""
return env.Configure(custom_tests = { 'CheckCompileFlag' : check_compile_flag, 'CheckLinkFlag': check_link_flag })
def GetOptionOrEnv(name, defval = None):
"""
Get option set on scons command line or in os.environ
"""
import os
#if optenv and name in optenv:
# return optenv[name]
if name in ARGUMENTS:
return ARGUMENTS[name]
if name in os.environ:
return os.environ[name]
return defval
import struct
def FileUnpackRead(pack, size, f, fpos=None, defval=None):
r = defval
try:
if not fpos is None: f.seek(fpos)
r = struct.unpack(pack, f.read(size))[0]
finally:
return r
def ReadU16LE(f, fpos=None, defval=None):
return FileUnpackRead("<H", 2, f, fpos, defval)
def ReadU32LE(f, fpos=None, defval=None):
return FileUnpackRead("<I", 4, f, fpos, defval)
def WriteU16LE(f, v, fpos):
if not fpos is None: f.seek(fpos)
return f.write(struct.pack("<H", v))
def WriteU32LE(f, v, fpos):
if not fpos is None: f.seek(fpos)
return f.write(struct.pack("<I", v))
class MSPE:
def __init__(self, path=None, open_for_write=False):
self._f = None
self._path = None
self.NTHOffset = 0
self.NTOHMagic = None
self.IsPEP = False # PE+ A.K.A IMAGE_NT_HEADERS64
if not path is None:
self.Open(path, open_for_write)
def __del__(self): self.Close()
def Close(self):
if getattr(self, '_f', None):
self._f.close()
self._f = None
def Open(self, path, open_for_write=False):
mode = "rb"
if open_for_write: mode = "r+b"
self._path = path
f = self._f = open(path, mode)
if not 0x5A4D == ReadU16LE(f, 0): return # IMAGE_DOS_SIGNATURE?
fanew = ReadU32LE(f, 60)
if not 0x00004550 == ReadU32LE(f, fanew): return # IMAGE_NT_SIGNATURE?
self.NTHOffset = fanew
self.NTOHMagic = ReadU16LE(f, fanew+4+20)
self.IsPEP = 0x20b == self.NTOHMagic # IMAGE_NT_OPTIONAL_HDR64_MAGIC?
def ReadMachine(self):
return ReadU16LE(self._f, self.NTHOffset+4+0)
def WriteTimeDateStamp(self, value):
return WriteU32LE(self._f, value, self.NTHOffset+4+4)
def ReadCharacteristics(self):
return ReadU16LE(self._f, self.NTHOffset+4+18)
def WriteCharacteristics(self, value):
return WriteU16LE(self._f, value, self.NTHOffset+4+18)
def ReadDllCharacteristics(self):
return ReadU16LE(self._f, self.NTHOffset+4+20+70)
def WriteDllCharacteristics(self, value):
return WriteU16LE(self._f, value, self.NTHOffset+4+20+70)
def WriteChecksum(self, value):
return WriteU32LE(self._f, value, self.NTHOffset+4+20+64)
def InvalidateChecksum(self):
return self.WriteChecksum(0) and 0
def IsPE(pe):
if not isinstance(pe, MSPE): pe = MSPE(pe)
if not pe.NTOHMagic is None: return True
def IsPEExecutable(pe):
if not isinstance(pe, MSPE): pe = MSPE(pe)
if int(pe.ReadCharacteristics() or 0) & 0x0002: return True # IMAGE_FILE_EXECUTABLE_IMAGE?
def SetPESecurityFlagsWorker(filepath):
"""
Sets the [HE]ASLR, DEP and LAA flags in the PE header
"""
pe = MSPE(filepath, open_for_write=True)
try:
if not IsPEExecutable(pe): return
ifh_c = pe.ReadCharacteristics()
ifh_c |= 0x0020 # +IMAGE_FILE_LARGE_ADDRESS_AWARE
pe.WriteCharacteristics(ifh_c)
ioh_dc = pe.ReadDllCharacteristics()
ioh_dc |= 0x0100 # +IMAGE_DLLCHARACTERISTICS_NX_COMPAT (DEP)
if pe.ReadMachine() != 0xaa64: # ARM64 forces exception directory?
ioh_dc |= 0x0400 # +IMAGE_DLLCHARACTERISTICS_NO_SEH
ioh_dc |= 0x8000 # +IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE (TODO: Should we set this on .DLLs?)
if not (ifh_c & 0x0001): # IMAGE_FILE_RELOCS_STRIPPED?
ioh_dc |= 0x0040 # +IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE (ASLR)
if pe.IsPEP: ioh_dc |= 0x0020 # +IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA (HEASLR)
pe.WriteDllCharacteristics(ioh_dc)
pe.InvalidateChecksum()
finally:
return
def SetPETimestamp(filepath, timestamp):
pe = MSPE(filepath, open_for_write=True)
try:
if not IsPE(pe): return
pe.WriteTimeDateStamp(int(timestamp or 0))
pe.InvalidateChecksum()
return True
finally:
return
def MakeReproducibleAction(target, source, env):
if env.get('SOURCE_DATE_EPOCH','') != '':
SetPETimestamp(target[0].path, env['SOURCE_DATE_EPOCH'])
def SilentActionEcho(target, source, env):
return None
Export('GetStdSysEnvVarList AddAvailableLibs AddZLib FlagsConfigure GetAvailableLibs GetOptionOrEnv SilentActionEcho IsPEExecutable SetPESecurityFlagsWorker MakeReproducibleAction')