| Index: chrome/test/functional/chromeos_ephemeral.py
|
| diff --git a/chrome/test/functional/chromeos_ephemeral.py b/chrome/test/functional/chromeos_ephemeral.py
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..fd9c77cd9bb7d950e7e794b9f19643e4106e7cc4
|
| --- /dev/null
|
| +++ b/chrome/test/functional/chromeos_ephemeral.py
|
| @@ -0,0 +1,221 @@
|
| +# Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +# Use of this source code is governed by a BSD-style license that can be
|
| +# found in the LICENSE file.
|
| +
|
| +import logging
|
| +import os
|
| +import sys
|
| +
|
| +import pyauto_functional # Must come before pyauto (and thus, policy_base).
|
| +import policy_base
|
| +
|
| +sys.path.append('/usr/local') # Required to import autotest libs.
|
| +from autotest.cros import constants
|
| +from autotest.cros import cryptohome
|
| +
|
| +
|
| +class ChromeosEphemeral(policy_base.PolicyTestBase):
|
| + """Tests a policy that makes all users except the owner ephemeral.
|
| +
|
| + When this policy is enabled, no persistent information in the form of
|
| + cryptohome shadow directories or local state prefs should be created for
|
| + users. Additionally, any persistent information previously accumulated should
|
| + be cleared when a user first logs in after enabling the policy."""
|
| +
|
| + def _SetDevicePolicyAndOwner(self, ephemeral_users_enabled, owner_index):
|
| + """Sets device policy and owner.
|
| +
|
| + TODO(bartfab): Ensure Login still works after crosbug.com/20709 is fixed.
|
| + The show_user_names policy is set to False to ensure that even if the local
|
| + state is not being automatically cleared, the login screen never shows user
|
| + pods. This is required by the Login browser automation call.
|
| + """
|
| + self.SetDevicePolicy(
|
| + device_policy={'ephemeral_users_enabled': ephemeral_users_enabled,
|
| + 'show_user_names': False},
|
| + owner=self._usernames[owner_index])
|
| +
|
| + def _DoesVaultDirectoryExist(self, user_index):
|
| + user_hash = cryptohome.get_user_hash(self._usernames[user_index])
|
| + return os.path.exists(os.path.join(constants.SHADOW_ROOT, user_hash))
|
| +
|
| + def _AssertLocalStatePrefsSet(self, user_indexes):
|
| + expected = sorted([self._usernames[index] for index in user_indexes])
|
| + # The OAuthTokenStatus pref is populated asynchronously. Checking whether it
|
| + # is set would lead to an ugly race.
|
| + for pref in ['LoggedInUsers', 'UserImages', 'UserDisplayEmail', ]:
|
| + actual = sorted(self.GetLocalStatePrefsInfo().Prefs(pref))
|
| + self.assertEqual(actual, expected,
|
| + msg='Expected to find prefs in local state for users.')
|
| +
|
| + def _AssertLocalStatePrefsEmpty(self):
|
| + for pref in ['LoggedInUsers',
|
| + 'UserImages',
|
| + 'UserDisplayEmail',
|
| + 'OAuthTokenStatus']:
|
| + self.assertFalse(self.GetLocalStatePrefsInfo().Prefs(pref),
|
| + msg='Expected to not find prefs in local state for any user.')
|
| +
|
| + def _AssertVaultDirectoryExists(self, user_index):
|
| + self.assertTrue(self._DoesVaultDirectoryExist(user_index=user_index),
|
| + msg='Expected vault shadow directory to exist.')
|
| +
|
| + def _AssertVaultDirectoryDoesNotExist(self, user_index):
|
| + self.assertFalse(self._DoesVaultDirectoryExist(user_index=user_index),
|
| + msg='Expected vault shadow directory to not exist.')
|
| +
|
| + def _AssertVaultMounted(self, user_index, ephemeral):
|
| + if ephemeral:
|
| + device_regex = constants.CRYPTOHOME_DEV_REGEX_REGULAR_USER_EPHEMERAL
|
| + fs_regex = constants.CRYPTOHOME_FS_REGEX_TMPFS
|
| + else:
|
| + device_regex = constants.CRYPTOHOME_DEV_REGEX_REGULAR_USER_SHADOW
|
| + fs_regex = constants.CRYPTOHOME_FS_REGEX_ANY
|
| + self.assertTrue(
|
| + cryptohome.is_vault_mounted(device_regex=device_regex,
|
| + fs_regex=fs_regex,
|
| + user=self._usernames[user_index],
|
| + allow_fail=True),
|
| + msg='Expected vault backed by %s to be mounted.' %
|
| + 'tmpfs' if ephemeral else 'shadow directory')
|
| +
|
| + def _AssertNoVaultMounted(self):
|
| + self.assertFalse(cryptohome.is_vault_mounted(allow_fail=True),
|
| + msg='Did not expect any vault to be mounted.')
|
| +
|
| + def Login(self, user_index):
|
| + self.assertFalse(self.GetLoginInfo()['is_logged_in'],
|
| + msg='Expected to be logged out.')
|
| + policy_base.PolicyTestBase.Login(self,
|
| + self._usernames[user_index],
|
| + self._passwords[user_index])
|
| + self.assertTrue(self.GetLoginInfo()['is_logged_in'],
|
| + msg='Expected to be logged in.')
|
| +
|
| + def ExtraChromeFlags(self):
|
| + """Sets up Chrome to skip OOBE.
|
| +
|
| + TODO(bartfab): Ensure OOBE is still skipped when crosbug.com/20709 is fixed.
|
| + Disabling automatic clearing of the local state has the curious side effect
|
| + of removing a flag that disables OOBE. This method adds back the flag.
|
| + """
|
| + flags = policy_base.PolicyTestBase.ExtraChromeFlags(self)
|
| + flags.append('--login-screen=login')
|
| + return flags
|
| +
|
| + def setUp(self):
|
| + policy_base.PolicyTestBase.setUp(self)
|
| + # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
|
| + # Try to disable automatic clearing of the local state.
|
| + self.TryToDisableLocalStateAutoClearingOnChromeOS()
|
| + self._local_state_auto_clearing = \
|
| + self.IsLocalStateAutoClearingEnabledOnChromeOS()
|
| + if not self._local_state_auto_clearing:
|
| + # Prevent the inherited Logout() method from cleaning up /home/chronos
|
| + # as this also clears the local state.
|
| + self.set_clear_profile(False)
|
| +
|
| + credentials = (self.GetPrivateInfo()['prod_enterprise_test_user'],
|
| + self.GetPrivateInfo()['prod_enterprise_executive_user'],
|
| + self.GetPrivateInfo()['prod_enterprise_sales_user'])
|
| + self._usernames = [credential['username'] for credential in credentials]
|
| + self._passwords = [credential['password'] for credential in credentials]
|
| +
|
| + def tearDown(self):
|
| + # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
|
| + # Try to re-enable automatic clearing of the local state and /home/chronos.
|
| + if not self._local_state_auto_clearing:
|
| + self.TryToEnableLocalStateAutoClearingOnChromeOS()
|
| + self.set_clear_profile(True)
|
| + policy_base.PolicyTestBase.tearDown(self)
|
| +
|
| + def testLoginAsOwnerIsNotEphemeral(self):
|
| + """Checks that the owner does not become ephemeral."""
|
| + self._SetDevicePolicyAndOwner(ephemeral_users_enabled=True, owner_index=0)
|
| +
|
| + self.Login(user_index=0)
|
| + # TODO(bartfab): Remove this when crosbug.com/20709 is fixed.
|
| + if self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0])
|
| + self._AssertVaultDirectoryExists(user_index=0)
|
| + self._AssertVaultMounted(user_index=0, ephemeral=False)
|
| + self.Logout()
|
| + # TODO(bartfab): Make this unconditional when crosbug.com/20709 is fixed.
|
| + if not self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0])
|
| + self._AssertVaultDirectoryExists(user_index=0)
|
| + self._AssertNoVaultMounted()
|
| +
|
| + def testLoginAsNonOwnerIsEphemeral(self):
|
| + """Checks that a non-owner user does become ephemeral."""
|
| + self._SetDevicePolicyAndOwner(ephemeral_users_enabled=True, owner_index=0)
|
| +
|
| + self.Login(user_index=1)
|
| + # TODO(bartfab): Remove this when crosbug.com/20709 is fixed.
|
| + if self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsEmpty()
|
| + self._AssertVaultDirectoryDoesNotExist(user_index=1)
|
| + self._AssertVaultMounted(user_index=1, ephemeral=True)
|
| + self.Logout()
|
| + # TODO(bartfab): Make this unconditional when crosbug.com/20709 is fixed.
|
| + if not self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsEmpty()
|
| +
|
| + self._AssertVaultDirectoryDoesNotExist(user_index=1)
|
| + self._AssertNoVaultMounted()
|
| +
|
| + def testEnablingEphemeralUsersCleansUp(self):
|
| + """Checks that persistent information is cleared."""
|
| + self._SetDevicePolicyAndOwner(ephemeral_users_enabled=False, owner_index=0)
|
| +
|
| + self.Login(user_index=0)
|
| + # TODO(bartfab): Remove this when crosbug.com/20709 is fixed.
|
| + if self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0])
|
| + self.Logout()
|
| + # TODO(bartfab): Make this unconditional when crosbug.com/20709 is fixed.
|
| + if not self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0])
|
| +
|
| + self.Login(user_index=1)
|
| + # TODO(bartfab): Remove this when crosbug.com/20709 is fixed.
|
| + if self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[1])
|
| + self.Logout()
|
| + # TODO(bartfab): Make this unconditional when crosbug.com/20709 is fixed.
|
| + if not self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0, 1])
|
| +
|
| + self.Login(user_index=2)
|
| + # TODO(bartfab): Remove this when crosbug.com/20709 is fixed.
|
| + if self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[2])
|
| + self.Logout()
|
| + # TODO(bartfab): Make this unconditional when crosbug.com/20709 is fixed.
|
| + if not self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0, 1, 2])
|
| +
|
| + self._AssertVaultDirectoryExists(user_index=0)
|
| + self._AssertVaultDirectoryExists(user_index=1)
|
| + self._AssertVaultDirectoryExists(user_index=2)
|
| +
|
| + self._SetDevicePolicyAndOwner(ephemeral_users_enabled=True, owner_index=0)
|
| +
|
| + self.Login(user_index=1)
|
| + # TODO(bartfab): Remove this when crosbug.com/20709 is fixed.
|
| + if self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsEmpty()
|
| + self._AssertVaultMounted(user_index=1, ephemeral=True)
|
| + self.Logout()
|
| +
|
| + # TODO(bartfab): Make this unconditional when crosbug.com/20709 is fixed.
|
| + if not self._local_state_auto_clearing:
|
| + self._AssertLocalStatePrefsSet(user_indexes=[0])
|
| +
|
| + self._AssertVaultDirectoryExists(user_index=0)
|
| + self._AssertVaultDirectoryDoesNotExist(user_index=1)
|
| + self._AssertVaultDirectoryDoesNotExist(user_index=2)
|
| +
|
| +
|
| +if __name__ == '__main__':
|
| + pyauto_functional.Main()
|
|
|