Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(121)

Unified Diff: client/cros/cros_ui_test.py

Issue 6677180: [autotest] More ownership/device policy tests (Closed) Base URL: http://git.chromium.org/git/autotest.git@master
Patch Set: comments Created 9 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « client/cros/cros_ownership_test.py ('k') | client/cros/ownership.py » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: client/cros/cros_ui_test.py
diff --git a/client/cros/cros_ui_test.py b/client/cros/cros_ui_test.py
index a60efa91f76fce6d997e067403450a4489c24ad0..85965db0e388ee62fd18b1ff81687112db5cac21 100644
--- a/client/cros/cros_ui_test.py
+++ b/client/cros/cros_ui_test.py
@@ -4,7 +4,7 @@
import dbus, logging, os, re, shutil, socket, sys
import common
-import auth_server, constants as chromeos_constants, cryptohome, dns_server
+import auth_server, constants, cryptohome, dns_server
import cros_logging, cros_ui, login, ownership
from autotest_lib.client.bin import test, utils
from autotest_lib.client.common_lib import error
@@ -86,7 +86,8 @@ class UITest(test.test):
servers = ipconfig.GetProperties().get('NameServers', None)
if servers != None:
self._dns[path] = ','.join(servers)
- logging.debug("Stored DNS for " + interface)
+ logging.debug("Stored %s for %s" % (self._dns[path],
+ interface))
ipconfig.SetProperty('NameServers', '127.0.0.1')
logging.debug("Using local DNS for " + interface)
@@ -152,7 +153,7 @@ class UITest(test.test):
Args:
creds: String specifying the credentials for this test case. Can
be a named set of credentials as defined by
- chromeos_constants.CREDENTIALS, or a 'username:password' pair.
+ constants.CREDENTIALS, or a 'username:password' pair.
Defaults to None -- browse without signing-in.
is_creating_owner: If the test case is creating a new device owner.
@@ -169,7 +170,7 @@ class UITest(test.test):
# Fake ownership unless the test is explicitly testing owner creation.
if not is_creating_owner and not os.access(
- chromeos_constants.OWNER_KEY_FILE, os.F_OK):
+ constants.OWNER_KEY_FILE, os.F_OK):
logging.info('Owner credentials not found. Faking ownership...')
self.__fake_ownership()
self.fake_owner = True
@@ -186,12 +187,7 @@ class UITest(test.test):
if is_creating_owner:
logging.info('Erasing stale owner state.')
- # Ensure there's no stale owner state from previous tests.
- try:
- os.unlink(chromeos_constants.OWNER_KEY_FILE)
- os.unlink(chromeos_constants.SIGNED_PREFERENCES_FILE)
- except (IOError, OSError) as err:
- logging.info(err)
+ ownership.clear_ownership()
login.refresh_login_screen()
if self.auto_login:
@@ -206,10 +202,10 @@ class UITest(test.test):
mock_certfile = os.path.join(dirname, 'mock_owner_cert.pem')
mock_signedprefsfile = os.path.join(dirname, 'mock_owner.preferences')
utils.open_write_close(
- chromeos_constants.OWNER_KEY_FILE,
+ constants.OWNER_KEY_FILE,
ownership.cert_extract_pubkey_der(mock_certfile))
shutil.copy(mock_signedprefsfile,
- chromeos_constants.SIGNED_PREFERENCES_FILE)
+ constants.SIGNED_PREFERENCES_FILE)
def __canonicalize(self, credential):
@@ -230,7 +226,7 @@ class UITest(test.test):
(name, domain) = parts
name = name.partition('+')[0]
- if (domain == chromeos_constants.SPECIAL_CASE_DOMAIN):
+ if (domain == constants.SPECIAL_CASE_DOMAIN):
name = name.replace('.', '')
return '@'.join([name, domain]).lower()
@@ -246,10 +242,10 @@ class UITest(test.test):
if not creds:
return [None, None] # Browse without signing-in.
if creds[0] == '$':
- if creds not in chromeos_constants.CREDENTIALS:
+ if creds not in constants.CREDENTIALS:
raise error.TestFail('Unknown credentials: %s' % creds)
- (name, passwd) = chromeos_constants.CREDENTIALS[creds]
+ (name, passwd) = constants.CREDENTIALS[creds]
return [self.__canonicalize(name), passwd]
(name, passwd) = creds.split(':')
@@ -341,7 +337,7 @@ class UITest(test.test):
match = crash_regex.search(line)
if (match and not match.group(1) in processes and
not (in_logout and
- (match.group(1) == chromeos_constants.BROWSER or
+ (match.group(1) == constants.BROWSER or
match.group(1) == 'supplied_chrome') and
match.group(2) == 'sig 6')):
self.job.record('INFO', self.tagged_testname,
@@ -351,7 +347,7 @@ class UITest(test.test):
def cleanup(self):
"""Overridden from test.cleanup() to log out when the test is complete.
"""
- logpath = chromeos_constants.CHROME_LOG_DIR
+ logpath = constants.CHROME_LOG_DIR
try:
for filename in os.listdir(logpath):
@@ -366,28 +362,24 @@ class UITest(test.test):
if login.logged_in():
try:
shutil.copy(
- os.path.join(chromeos_constants.CRYPTOHOME_MOUNT_PT,
+ os.path.join(constants.CRYPTOHOME_MOUNT_PT,
'log', 'chrome'),
self.resultsdir+'/chrome_postlogin_log')
except (IOError, OSError) as err:
logging.error(err)
self.logout()
- if os.path.isfile(chromeos_constants.CRYPTOHOMED_LOG):
+ if os.path.isfile(constants.CRYPTOHOMED_LOG):
try:
- base = os.path.basename(chromeos_constants.CRYPTOHOMED_LOG)
- shutil.copy(chromeos_constants.CRYPTOHOMED_LOG,
+ base = os.path.basename(constants.CRYPTOHOMED_LOG)
+ shutil.copy(constants.CRYPTOHOMED_LOG,
os.path.join(self.resultsdir, base))
except (IOError, OSError) as err:
logging.error(err)
if self.fake_owner:
logging.info('Erasing fake owner state.')
- try:
- os.unlink(chromeos_constants.OWNER_KEY_FILE)
- os.unlink(chromeos_constants.SIGNED_PREFERENCES_FILE)
- except (IOError, OSError) as err:
- logging.info(err)
+ ownership.clear_ownership()
self.stop_authserver()
self.__log_crashed_processes(self.crash_blacklist)
« no previous file with comments | « client/cros/cros_ownership_test.py ('k') | client/cros/ownership.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698