# <http://www.gnu.org/licenses/lgpl-3.0.html>
-import os, unittest, hashlib, string
+import os, unittest, hashlib, string, sys
from deltatar.tarfile import TarFile, GNU_FORMAT, GZ_MAGIC_BYTES
os.unlink("small2")
# extract using the command line this time
- os.system("python3 filesplit.py -s $'\\x1f\\x8b' -p sample.tar.gz. sample.tar.gz")
+ os.system("'%s' filesplit.py -s $'\\x1f\\x8b' -p sample.tar.gz. sample.tar.gz"
+ % sys.executable)
assert os.path.exists("sample.tar.gz.0") # first file
assert os.path.exists("sample.tar.gz.1") # second file
import logging
import binascii
import json
+import sys
from datetime import datetime
from functools import partial
from unittest import skip, SkipTest
# split the resulting archive into its constituents without
# decrypting
- ret = os.system("python3 ./deltatar/crypto.py process -D -S -i - "
- "-o backup_dir/split <\'%s\'" % backup_path)
+ ret = os.system("'%s' ./deltatar/crypto.py process -D -S -i - "
+ "-o backup_dir/split <\'%s\'"
+ % (sys.executable, backup_path))
assert os.path.exists ("backup_dir/split")
import json
import os
import subprocess
+import sys
from deltatar import crypto
from deltatar.tarfile import TarFile, GNU_FORMAT
# decrypt outer archive layer with crypto.py
assert os.path.exists("sample.tar.gz.pdtcrypt")
- ret = os.system("python3 ./deltatar/crypto.py process -p '%s' "
- "<sample.tar.gz.pdtcrypt >sample.tar.gz" % pw)
+ ret = os.system("'%s' ./deltatar/crypto.py process -p '%s' "
+ "<sample.tar.gz.pdtcrypt >sample.tar.gz"
+ % (sys.executable, pw))
assert ret == 0
assert os.path.exists("sample.tar.gz")
# decrypt outer archive layer with crypto.py
assert os.path.exists("sample.tar.gz.pdtcrypt")
- ret = os.system("python3 ./deltatar/crypto.py process -k '%s' "
+ ret = os.system("'%s' ./deltatar/crypto.py process -k '%s' "
"<sample.tar.gz.pdtcrypt >sample.tar.gz"
- % binascii.hexlify (key).decode ())
+ % (sys.executable, binascii.hexlify (key).decode ()))
assert ret == 0
assert os.path.exists("sample.tar.gz")
# decrypt outer archive layer with crypto.py
assert os.path.exists("sample.tar.gz.pdtcrypt")
- ret = os.system("PDTCRYPT_KEY='%s' python3 ./deltatar/crypto.py process "
+ ret = os.system("PDTCRYPT_KEY='%s' '%s' ./deltatar/crypto.py process "
"<sample.tar.gz.pdtcrypt >sample.tar.gz"
- % binascii.hexlify (key).decode ())
+ % (binascii.hexlify (key).decode (), sys.executable))
assert ret == 0
assert os.path.exists("sample.tar.gz")
# decrypt outer archive layer with crypto.py
assert os.path.exists("sample.tar.gz.pdtcrypt")
- with subprocess.Popen ( [ "python3", "./deltatar/crypto.py", "scrypt"
+ with subprocess.Popen ( [ sys.executable, "./deltatar/crypto.py", "scrypt"
, "-f", "params"
, "-i", "sample.tar.gz.pdtcrypt" ]
, env={ "PDTCRYPT_PASSWORD" : pw }
os.unlink(k)
assert os.path.exists("sample.tar.gz.pdtcrypt")
- ret = os.system("python3 ./deltatar/crypto.py process -p '%s' -s --split "
- "-i sample.tar.gz.pdtcrypt -o ." % pw)
+ ret = os.system("'%s' ./deltatar/crypto.py process -p '%s' -s --split "
+ "-i sample.tar.gz.pdtcrypt -o ." % (sys.executable, pw))
assert ret == 0
for i in range (len (hash)):
fname = "pdtcrypt-object-%d.bin" % (i + 1)
os.unlink(k)
assert os.path.exists("sample.tar.gz.pdtcrypt")
- ret = os.system("PDTCRYPT_PASSWORD='%s' python3 ./deltatar/crypto.py "
+ ret = os.system("PDTCRYPT_PASSWORD='%s' '%s' ./deltatar/crypto.py "
"process -s --split -i sample.tar.gz.pdtcrypt -o ."
- % pw)
+ % (pw, sys.executable))
assert ret == 0
for i in range (len (hash)):
fname = "pdtcrypt-object-%d.bin" % (i + 1)