| # Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| |
| import logging, os, tempfile |
| from dbus.mainloop.glib import DBusGMainLoop |
| |
| from autotest_lib.client.bin import test, utils |
| from autotest_lib.client.common_lib import autotemp, error |
| from autotest_lib.client.common_lib.cros import policy, session_manager |
| from autotest_lib.client.cros import cros_ui, cryptohome, ownership |
| |
| |
| class login_OwnershipApi(test.test): |
| """Tests to ensure that the Ownership API works for a local device owner. |
| """ |
| version = 1 |
| |
| _tempdir = None |
| |
| def setup(self): |
| os.chdir(self.srcdir) |
| utils.make('OUT_DIR=.') |
| |
| |
| def initialize(self): |
| super(login_OwnershipApi, self).initialize() |
| self._bus_loop = DBusGMainLoop(set_as_default=True) |
| self._cryptohome_proxy = cryptohome.CryptohomeProxy(self._bus_loop) |
| |
| # Clear existing ownership and inject known keys. |
| cros_ui.stop() |
| ownership.clear_ownership_files_no_restart() |
| |
| # Make device already owned by ownership.TESTUSER. |
| self._cryptohome_proxy.mount(ownership.TESTUSER, |
| ownership.TESTPASS, |
| create=True) |
| ownership.use_known_ownerkeys(ownership.TESTUSER) |
| |
| self._tempdir = autotemp.tempdir(unique_id=self.__class__.__name__) |
| cros_ui.start() |
| |
| |
| def __generate_temp_filename(self, dir): |
| """Generate a guaranteed-unique filename in dir.""" |
| just_for_name = tempfile.NamedTemporaryFile(dir=dir, delete=True) |
| basename = just_for_name.name |
| just_for_name.close() # deletes file. |
| return basename |
| |
| |
| def run_once(self): |
| pkey = ownership.known_privkey() |
| pubkey = ownership.known_pubkey() |
| sm = session_manager.connect(self._bus_loop) |
| if not sm.StartSession(ownership.TESTUSER, ''): |
| raise error.TestFail('Could not start session for owner') |
| |
| poldata = policy.build_policy_data(self.srcdir, |
| owner=ownership.TESTUSER, |
| guests=False, |
| new_users=True, |
| roaming=True, |
| whitelist=(ownership.TESTUSER, |
| 'a@b.c'), |
| proxies={ 'proxy_mode': 'direct' }) |
| |
| policy_string = policy.generate_policy(self.srcdir, |
| pkey, |
| pubkey, |
| poldata) |
| policy.push_policy_and_verify(policy_string, sm) |
| retrieved_policy = policy.get_policy(sm) |
| if retrieved_policy is None: raise error.TestFail('Policy not found') |
| policy.compare_policy_response(self.srcdir, |
| retrieved_policy, |
| owner=ownership.TESTUSER, |
| guests=False, |
| new_users=True, |
| roaming=True, |
| whitelist=(ownership.TESTUSER, 'a@b.c'), |
| proxies={ 'proxy_mode': 'direct' }) |
| try: |
| # Sanity check against an incorrect policy |
| policy.compare_policy_response(self.srcdir, |
| retrieved_policy, |
| owner=ownership.TESTUSER, |
| guests=True, |
| whitelist=(ownership.TESTUSER, |
| 'a@b.c'), |
| proxies={ 'proxy_mode': 'direct' }) |
| except ownership.OwnershipError: |
| pass |
| else: |
| raise error.TestFail('Did not detect bad policy') |
| |
| try: |
| sm.StopSession('') |
| except error.TestError as e: |
| logging.error(str(e)) |
| raise error.TestFail('Could not stop session for owner') |
| |
| |
| def cleanup(self): |
| if self._tempdir: self._tempdir.clean() |
| # Best effort to bounce the UI, which may be up or down. |
| cros_ui.stop(allow_fail=True) |
| self._cryptohome_proxy.remove(ownership.TESTUSER) |
| cros_ui.start(allow_fail=True, wait_for_login_prompt=False) |
| super(login_OwnershipApi, self).cleanup() |