Home | History | Annotate | Download | only in login_OwnershipRetaken
      1 # Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
      2 # Use of this source code is governed by a BSD-style license that can be
      3 # found in the LICENSE file.
      4 
      5 import gobject, os
      6 from dbus.mainloop.glib import DBusGMainLoop
      7 
      8 from autotest_lib.client.bin import test, utils
      9 from autotest_lib.client.common_lib import error
     10 from autotest_lib.client.common_lib.cros import policy, session_manager
     11 from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership
     12 
     13 
     14 class login_OwnershipRetaken(test.test):
     15     """"Ensure that ownership is re-taken upon loss of owner's cryptohome."""
     16     version = 1
     17 
     18     _tempdir = None
     19     _got_new_key = False
     20     _got_new_policy = False
     21 
     22     def setup(self):
     23         os.chdir(self.srcdir)
     24         utils.make('OUT_DIR=.')
     25 
     26 
     27     def initialize(self):
     28         super(login_OwnershipRetaken, self).initialize()
     29         # Start clean, wrt ownership and the desired user.
     30         ownership.restart_ui_to_clear_ownership_files()
     31 
     32         bus_loop = DBusGMainLoop(set_as_default=True)
     33         self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
     34         self._cryptohome_proxy.remove(ownership.TESTUSER)
     35 
     36         self._sm = session_manager.connect(bus_loop)
     37 
     38 
     39     def run_once(self):
     40         pkey = ownership.known_privkey()
     41         pubkey = ownership.known_pubkey()
     42 
     43         # Pre-configure some owner settings, including initial key.
     44         poldata = policy.build_policy_data(self.srcdir,
     45                                            owner=ownership.TESTUSER,
     46                                            guests=False,
     47                                            new_users=True,
     48                                            roaming=True,
     49                                            whitelist=(ownership.TESTUSER,
     50                                                       'a@b.c'),
     51                                            proxies={ 'proxy_mode': 'direct' })
     52         policy_string = policy.generate_policy(self.srcdir,
     53                                                pkey,
     54                                                pubkey,
     55                                                poldata)
     56         policy.push_policy_and_verify(policy_string, self._sm)
     57 
     58         # grab key, ensure that it's the same as the known key.
     59         if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey):
     60             raise error.TestFail('Owner key should not have changed!')
     61 
     62         # Start a new session, which will trigger the re-taking of ownership.
     63         listener = session_manager.OwnershipSignalListener(gobject.MainLoop())
     64         listener.listen_for_new_key_and_policy()
     65         self._cryptohome_proxy.mount(ownership.TESTUSER,
     66                                      ownership.TESTPASS,
     67                                      create=True)
     68         if not self._sm.StartSession(ownership.TESTUSER, ''):
     69             raise error.TestError('Could not start session for owner')
     70 
     71         listener.wait_for_signals(desc='Re-taking of ownership complete.')
     72 
     73         # grab key, ensure that it's different than known key
     74         if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
     75             raise error.TestFail('Owner key should have changed!')
     76 
     77         # RetrievePolicy, check sig against new key, check properties
     78         retrieved_policy = self._sm.RetrievePolicy(byte_arrays=True)
     79         if retrieved_policy is None:
     80             raise error.TestError('Policy not found')
     81         policy.compare_policy_response(self.srcdir,
     82                                        retrieved_policy,
     83                                        owner=ownership.TESTUSER,
     84                                        guests=False,
     85                                        new_users=True,
     86                                        roaming=True,
     87                                        whitelist=(ownership.TESTUSER, 'a (at] b.c'),
     88                                        proxies={ 'proxy_mode': 'direct' })
     89 
     90 
     91     def cleanup(self):
     92         if self._tempdir: self._tempdir.clean()
     93         cros_ui.restart()
     94         self._cryptohome_proxy.remove(ownership.TESTUSER)
     95         super(login_OwnershipRetaken, self).cleanup()
     96