summaryrefslogtreecommitdiff
path: root/deps/gyp/test/win/gyptest-link-enable-uac.py
diff options
context:
space:
mode:
Diffstat (limited to 'deps/gyp/test/win/gyptest-link-enable-uac.py')
-rw-r--r--deps/gyp/test/win/gyptest-link-enable-uac.py95
1 files changed, 0 insertions, 95 deletions
diff --git a/deps/gyp/test/win/gyptest-link-enable-uac.py b/deps/gyp/test/win/gyptest-link-enable-uac.py
deleted file mode 100644
index 131e07ec1f..0000000000
--- a/deps/gyp/test/win/gyptest-link-enable-uac.py
+++ /dev/null
@@ -1,95 +0,0 @@
-#!/usr/bin/env python
-
-# Copyright 2013 Google Inc. All rights reserved.
-# Use of this source code is governed by a BSD-style license that can be
-# found in the LICENSE file.
-
-"""
-Verifies that embedding UAC information into the manifest works.
-"""
-
-import TestGyp
-
-import sys
-from xml.dom.minidom import parseString
-
-if sys.platform == 'win32':
- import pywintypes
- import win32api
- import winerror
-
- RT_MANIFEST = 24
-
- class LoadLibrary(object):
- """Context manager for loading and releasing binaries in Windows.
- Yields the handle of the binary loaded."""
- def __init__(self, path):
- self._path = path
- self._handle = None
-
- def __enter__(self):
- self._handle = win32api.LoadLibrary(self._path)
- return self._handle
-
- def __exit__(self, type, value, traceback):
- win32api.FreeLibrary(self._handle)
-
-
- def extract_manifest(path, resource_name):
- """Reads manifest from |path| and returns it as a string.
- Returns None is there is no such manifest."""
- with LoadLibrary(path) as handle:
- try:
- return win32api.LoadResource(handle, RT_MANIFEST, resource_name)
- except pywintypes.error as error:
- if error.args[0] == winerror.ERROR_RESOURCE_DATA_NOT_FOUND:
- return None
- else:
- raise
-
- test = TestGyp.TestGyp(formats=['msvs', 'ninja'])
- CHDIR = 'linker-flags'
- test.run_gyp('enable-uac.gyp', chdir=CHDIR)
- test.build('enable-uac.gyp', test.ALL, chdir=CHDIR)
-
- # The following binaries must contain a manifest embedded.
- test.fail_test(not extract_manifest(test.built_file_path(
- 'enable_uac.exe', chdir=CHDIR), 1))
- test.fail_test(not extract_manifest(test.built_file_path(
- 'enable_uac_no.exe', chdir=CHDIR), 1))
- test.fail_test(not extract_manifest(test.built_file_path(
- 'enable_uac_admin.exe', chdir=CHDIR), 1))
-
- # Verify that <requestedExecutionLevel level="asInvoker" uiAccess="false" />
- # is present.
- manifest = parseString(extract_manifest(
- test.built_file_path('enable_uac.exe', chdir=CHDIR), 1))
- execution_level = manifest.getElementsByTagName('requestedExecutionLevel')
- test.fail_test(len(execution_level) != 1)
- execution_level = execution_level[0].attributes
- test.fail_test(not (
- execution_level.has_key('level') and
- execution_level.has_key('uiAccess') and
- execution_level['level'].nodeValue == 'asInvoker' and
- execution_level['uiAccess'].nodeValue == 'false'))
-
- # Verify that <requestedExecutionLevel> is not in the menifest.
- manifest = parseString(extract_manifest(
- test.built_file_path('enable_uac_no.exe', chdir=CHDIR), 1))
- execution_level = manifest.getElementsByTagName('requestedExecutionLevel')
- test.fail_test(len(execution_level) != 0)
-
- # Verify that <requestedExecutionLevel level="requireAdministrator"
- # uiAccess="true" /> is present.
- manifest = parseString(extract_manifest(
- test.built_file_path('enable_uac_admin.exe', chdir=CHDIR), 1))
- execution_level = manifest.getElementsByTagName('requestedExecutionLevel')
- test.fail_test(len(execution_level) != 1)
- execution_level = execution_level[0].attributes
- test.fail_test(not (
- execution_level.has_key('level') and
- execution_level.has_key('uiAccess') and
- execution_level['level'].nodeValue == 'requireAdministrator' and
- execution_level['uiAccess'].nodeValue == 'true'))
-
- test.pass_test()