• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5import gobject, os
6from dbus.mainloop.glib import DBusGMainLoop
7
8from autotest_lib.client.bin import test, utils
9from autotest_lib.client.common_lib import error
10from autotest_lib.client.common_lib.cros import policy, session_manager
11from autotest_lib.client.cros import constants, cros_ui, cryptohome, ownership
12
13
14class login_OwnershipRetaken(test.test):
15    """"Ensure that ownership is re-taken upon loss of owner's cryptohome."""
16    version = 1
17
18    _tempdir = None
19    _got_new_key = False
20    _got_new_policy = False
21
22    def setup(self):
23        os.chdir(self.srcdir)
24        utils.make('OUT_DIR=.')
25
26
27    def initialize(self):
28        super(login_OwnershipRetaken, self).initialize()
29        # Start clean, wrt ownership and the desired user.
30        ownership.restart_ui_to_clear_ownership_files()
31
32        bus_loop = DBusGMainLoop(set_as_default=True)
33        self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
34        self._cryptohome_proxy.remove(ownership.TESTUSER)
35
36        self._sm = session_manager.connect(bus_loop)
37
38
39    def run_once(self):
40        pkey = ownership.known_privkey()
41        pubkey = ownership.known_pubkey()
42
43        # Pre-configure some owner settings, including initial key.
44        poldata = policy.build_policy_data(self.srcdir,
45                                           owner=ownership.TESTUSER,
46                                           guests=False,
47                                           new_users=True,
48                                           roaming=True,
49                                           whitelist=(ownership.TESTUSER,
50                                                      'a@b.c'),
51                                           proxies={ 'proxy_mode': 'direct' })
52        policy_string = policy.generate_policy(self.srcdir,
53                                               pkey,
54                                               pubkey,
55                                               poldata)
56        policy.push_policy_and_verify(policy_string, self._sm)
57
58        # grab key, ensure that it's the same as the known key.
59        if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey):
60            raise error.TestFail('Owner key should not have changed!')
61
62        # Start a new session, which will trigger the re-taking of ownership.
63        listener = session_manager.OwnershipSignalListener(gobject.MainLoop())
64        listener.listen_for_new_key_and_policy()
65        self._cryptohome_proxy.mount(ownership.TESTUSER,
66                                     ownership.TESTPASS,
67                                     create=True)
68        if not self._sm.StartSession(ownership.TESTUSER, ''):
69            raise error.TestError('Could not start session for owner')
70
71        listener.wait_for_signals(desc='Re-taking of ownership complete.')
72
73        # grab key, ensure that it's different than known key
74        if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
75            raise error.TestFail('Owner key should have changed!')
76
77        # RetrievePolicy, check sig against new key, check properties
78        retrieved_policy = self._sm.RetrievePolicy(byte_arrays=True)
79        if retrieved_policy is None:
80            raise error.TestError('Policy not found')
81        policy.compare_policy_response(self.srcdir,
82                                       retrieved_policy,
83                                       owner=ownership.TESTUSER,
84                                       guests=False,
85                                       new_users=True,
86                                       roaming=True,
87                                       whitelist=(ownership.TESTUSER, 'a@b.c'),
88                                       proxies={ 'proxy_mode': 'direct' })
89
90
91    def cleanup(self):
92        if self._tempdir: self._tempdir.clean()
93        cros_ui.restart()
94        self._cryptohome_proxy.remove(ownership.TESTUSER)
95        super(login_OwnershipRetaken, self).cleanup()
96