Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(319)

Unified Diff: chrome/test/functional/chromeos_device_policy.py

Issue 10830053: [chromeos] Simplify chromeos device policy tests (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: relogin hack Created 8 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/test/functional/chromeos_device_policy.py
diff --git a/chrome/test/functional/chromeos_device_policy.py b/chrome/test/functional/chromeos_device_policy.py
index 85e6df20fc0996ea9598b050d114aae7b87c14d6..ce1737808ac335a84d92777298ee6d1bab8c9589 100644
--- a/chrome/test/functional/chromeos_device_policy.py
+++ b/chrome/test/functional/chromeos_device_policy.py
@@ -11,6 +11,15 @@ import policy_base
class ChromeosDevicePolicy(policy_base.PolicyTestBase):
"""Tests various ChromeOS device policies."""
+ # Cache user credentials for easy lookup. The first user will become the
+ # owner.
bartfab (slow) 2012/07/30 08:59:45 Nit: This comment is actually no longer true. Now
+ private_info = policy_base.PolicyTestBase.GetPrivateInfo()
+ credentials = (private_info['prod_enterprise_test_user'],
+ private_info['prod_enterprise_executive_user'],
+ private_info['prod_enterprise_sales_user'])
+ _usernames = [credential['username'] for credential in credentials]
+ _passwords = [credential['password'] for credential in credentials]
+
def LoginAsGuest(self):
self.assertFalse(self.GetLoginInfo()['is_logged_in'],
msg='Expected to be logged out.')
@@ -31,50 +40,6 @@ class ChromeosDevicePolicy(policy_base.PolicyTestBase):
self.assertFalse(self.GetLoginInfo()['is_logged_in'],
msg='Expected to not be logged in.')
- # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
- def TryToDisableLocalStateAutoClearing(self):
- # Try to disable automatic clearing of the local state.
- self.TryToDisableLocalStateAutoClearingOnChromeOS()
- self._local_state_auto_clearing = \
- self.IsLocalStateAutoClearingEnabledOnChromeOS()
- if not self._local_state_auto_clearing:
- # Prevent the inherited Logout() method from cleaning up /home/chronos
- # as this also clears the local state.
- self.set_clear_profile(False)
-
- def ExtraChromeFlags(self):
- """Sets up Chrome to skip OOBE.
-
- TODO(bartfab): Ensure OOBE is still skipped when crosbug.com/20709 is fixed.
- Disabling automatic clearing of the local state has the curious side effect
- of removing a flag that disables OOBE. This method adds back the flag.
- """
- flags = policy_base.PolicyTestBase.ExtraChromeFlags(self)
- flags.append('--login-screen=login')
- return flags
-
- def setUp(self):
- policy_base.PolicyTestBase.setUp(self)
- # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
- self._local_state_auto_clearing = \
- self.IsLocalStateAutoClearingEnabledOnChromeOS()
-
- # Cache user credentials for easy lookup. The first user will become the
- # owner.
- credentials = (self.GetPrivateInfo()['prod_enterprise_test_user'],
- self.GetPrivateInfo()['prod_enterprise_executive_user'],
- self.GetPrivateInfo()['prod_enterprise_sales_user'])
- self._usernames = [credential['username'] for credential in credentials]
- self._passwords = [credential['password'] for credential in credentials]
-
- def tearDown(self):
- # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
- # Try to re-enable automatic clearing of the local state and /home/chronos.
- if not self._local_state_auto_clearing:
- self.TryToEnableLocalStateAutoClearingOnChromeOS()
- self.set_clear_profile(True)
- policy_base.PolicyTestBase.tearDown(self)
-
def _CheckGuestModeAvailableInLoginWindow(self):
return self.ExecuteJavascriptInOOBEWebUI(
"""window.domAutomationController.send(
@@ -113,13 +78,6 @@ class ChromeosDevicePolicy(policy_base.PolicyTestBase):
self.assertFalse(self._CheckGuestModeAvailableInLoginWindow(),
msg='Expected guest mode to not be available.')
- # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
- self.TryToDisableLocalStateAutoClearing()
- if self._local_state_auto_clearing:
- logging.warn("""Unable to disable local state clearing. Skipping remainder
- of test.""")
- return
-
# Log in as a regular so that the pod row contains at least one pod and the
# account picker is shown.
self.Login(user_index=0, expect_success=True)
@@ -137,12 +95,6 @@ class ChromeosDevicePolicy(policy_base.PolicyTestBase):
def testShowUserNamesOnSignin(self):
"""Checks that the account picker can be enabled/disabled."""
- # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
- self.TryToDisableLocalStateAutoClearing()
- if self._local_state_auto_clearing:
- logging.warn('Unable to disable local state clearing. Skipping test.')
- return
-
# Log in as a regular user so that the pod row contains at least one pod and
# the account picker can be shown.
self.Login(user_index=0, expect_success=True)
@@ -163,8 +115,13 @@ class ChromeosDevicePolicy(policy_base.PolicyTestBase):
ommitted since the broken behavior should be fixed rather than protected by
tests.
"""
+ # TODO(nirnimesh): Remove show_user_names policy below when
+ # Login() automation can reliably handle relogin scenario.
+ # crbug.com/139166
+
# No whitelist
- self.SetDevicePolicy({'allow_new_users': True})
+ self.SetDevicePolicy({'allow_new_users': True,
+ 'show_user_names': False})
self.Login(user_index=0, expect_success=True)
self.Logout()
@@ -174,18 +131,21 @@ class ChromeosDevicePolicy(policy_base.PolicyTestBase):
self.Logout()
self.SetDevicePolicy({'allow_new_users': True,
- 'user_whitelist': []})
+ 'user_whitelist': [],
+ 'show_user_names': False})
self.Login(user_index=0, expect_success=True)
self.Logout()
# Populated whitelist
- self.SetDevicePolicy({'user_whitelist': [self._usernames[0]]})
+ self.SetDevicePolicy({'user_whitelist': [self._usernames[0]],
+ 'show_user_names': False})
self.Login(user_index=0, expect_success=True)
self.Logout()
self.Login(user_index=1, expect_success=False)
self.SetDevicePolicy({'allow_new_users': True,
- 'user_whitelist': [self._usernames[0]]})
+ 'user_whitelist': [self._usernames[0]],
+ 'show_user_names': False})
self.Login(user_index=0, expect_success=True)
self.Logout()
self.Login(user_index=1, expect_success=True)
@@ -193,19 +153,14 @@ class ChromeosDevicePolicy(policy_base.PolicyTestBase):
# New users not allowed, populated whitelist
self.SetDevicePolicy({'allow_new_users': False,
- 'user_whitelist': [self._usernames[0]]})
+ 'user_whitelist': [self._usernames[0]],
+ 'show_user_names': False})
self.Login(user_index=0, expect_success=True)
self.Logout()
self.Login(user_index=1, expect_success=False)
def testUserWhitelistInAccountPicker(self):
"""Checks that setting a whitelist removes non-whitelisted user pods."""
- # TODO(bartfab): Remove this after crosbug.com/20709 is fixed.
- self.TryToDisableLocalStateAutoClearing()
- if self._local_state_auto_clearing:
- logging.warn('Unable to disable local state clearing. Skipping test.')
- return
-
# Disable the account picker so that the login form is shown and the Login()
# automation call can be used.
self.PrepareToWaitForLoginFormReload()
« no previous file with comments | « no previous file | chrome/test/pyautolib/chromeos/suid_actions.py » ('j') | chrome/test/pyautolib/chromeos/suid_actions.py » ('J')

Powered by Google App Engine
This is Rietveld 408576698