1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495 |
- #!/usr/bin/env python
- # Copyright 2013 Google Inc. All rights reserved.
- # Use of this source code is governed by a BSD-style license that can be
- # found in the LICENSE file.
- """
- Verifies that embedding UAC information into the manifest works.
- """
- import TestGyp
- import sys
- from xml.dom.minidom import parseString
- if sys.platform == 'win32':
- import pywintypes
- import win32api
- import winerror
- RT_MANIFEST = 24
- class LoadLibrary(object):
- """Context manager for loading and releasing binaries in Windows.
- Yields the handle of the binary loaded."""
- def __init__(self, path):
- self._path = path
- self._handle = None
- def __enter__(self):
- self._handle = win32api.LoadLibrary(self._path)
- return self._handle
- def __exit__(self, type, value, traceback):
- win32api.FreeLibrary(self._handle)
- def extract_manifest(path, resource_name):
- """Reads manifest from |path| and returns it as a string.
- Returns None is there is no such manifest."""
- with LoadLibrary(path) as handle:
- try:
- return win32api.LoadResource(handle, RT_MANIFEST, resource_name)
- except pywintypes.error as error:
- if error.args[0] == winerror.ERROR_RESOURCE_DATA_NOT_FOUND:
- return None
- else:
- raise
- test = TestGyp.TestGyp(formats=['msvs', 'ninja'])
- CHDIR = 'linker-flags'
- test.run_gyp('enable-uac.gyp', chdir=CHDIR)
- test.build('enable-uac.gyp', test.ALL, chdir=CHDIR)
- # The following binaries must contain a manifest embedded.
- test.fail_test(not extract_manifest(test.built_file_path(
- 'enable_uac.exe', chdir=CHDIR), 1))
- test.fail_test(not extract_manifest(test.built_file_path(
- 'enable_uac_no.exe', chdir=CHDIR), 1))
- test.fail_test(not extract_manifest(test.built_file_path(
- 'enable_uac_admin.exe', chdir=CHDIR), 1))
- # Verify that <requestedExecutionLevel level="asInvoker" uiAccess="false" />
- # is present.
- manifest = parseString(extract_manifest(
- test.built_file_path('enable_uac.exe', chdir=CHDIR), 1))
- execution_level = manifest.getElementsByTagName('requestedExecutionLevel')
- test.fail_test(len(execution_level) != 1)
- execution_level = execution_level[0].attributes
- test.fail_test(not (
- execution_level.has_key('level') and
- execution_level.has_key('uiAccess') and
- execution_level['level'].nodeValue == 'asInvoker' and
- execution_level['uiAccess'].nodeValue == 'false'))
- # Verify that <requestedExecutionLevel> is not in the menifest.
- manifest = parseString(extract_manifest(
- test.built_file_path('enable_uac_no.exe', chdir=CHDIR), 1))
- execution_level = manifest.getElementsByTagName('requestedExecutionLevel')
- test.fail_test(len(execution_level) != 0)
- # Verify that <requestedExecutionLevel level="requireAdministrator"
- # uiAccess="true" /> is present.
- manifest = parseString(extract_manifest(
- test.built_file_path('enable_uac_admin.exe', chdir=CHDIR), 1))
- execution_level = manifest.getElementsByTagName('requestedExecutionLevel')
- test.fail_test(len(execution_level) != 1)
- execution_level = execution_level[0].attributes
- test.fail_test(not (
- execution_level.has_key('level') and
- execution_level.has_key('uiAccess') and
- execution_level['level'].nodeValue == 'requireAdministrator' and
- execution_level['uiAccess'].nodeValue == 'true'))
- test.pass_test()
|