Skip to content

Commit a6b2d1c

Browse files
committed
win_guest_debugging_tool: Add IE ESC disable logic
Add IE ESC disable logic for Win2016. Signed-off-by: Dehan Meng <demeng@redhat.com>
1 parent 43e07ca commit a6b2d1c

2 files changed

Lines changed: 13 additions & 1 deletion

File tree

qemu/tests/cfg/win_guest_debugging_tool.cfg

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,10 @@
1818
target_dump_files = "MEMORY.DMP,Minidump"
1919
script_name = "CollectSystemInfo.ps1"
2020
cmd_search_file_global = powershell.exe -Command "Get-PSDrive -PSProvider FileSystem | ForEach-Object { Get-ChildItem -Path $_.Root -Recurse -Filter '%s' -ErrorAction SilentlyContinue } | ForEach-Object { Join-Path -Path $_.Directory.FullName -ChildPath $_.Name }"
21+
Win2016:
22+
script_execution_timeout = 1200
23+
cmd_disable_ie_esc_admin = powershell.exe -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}' -Name 'IsInstalled' -Value 0"
24+
cmd_disable_ie_esc_user = powershell.exe -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A8-37EF-4b3f-8CFC-4F3A74704073}' -Name 'IsInstalled' -Value 0"
2125
variants:
2226
- check_script_execution:
2327
windegtool_check_type = script_execution

qemu/tests/win_guest_debugging_tool.py

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ def _get_session(self, new=False):
3838
self._open_sessions.append(self.session)
3939
return self.session
4040
self.vm.verify_alive()
41-
timeout = int(self.params.get("login_timeout", 360))
41+
timeout = self.params.get_numeric("login_timeout", 360)
4242
session = self.vm.wait_for_login(timeout=timeout)
4343
self._open_sessions.append(session)
4444
if new:
@@ -83,6 +83,14 @@ def setup(self):
8383
self.session.cmd_output(self.params["cmd_create_dir"] % self.tmp_dir)
8484
self.session.cmd(f'cd "{self.tmp_dir}"')
8585

86+
# Disable IE Enhanced Security Configuration for Win2016 if configured
87+
if self.params.get("cmd_disable_ie_esc_admin"):
88+
error_context.context(
89+
"Disabling IE Enhanced Security Configuration.", LOG_JOB.info
90+
)
91+
self.session.cmd(self.params["cmd_disable_ie_esc_admin"])
92+
self.session.cmd(self.params["cmd_disable_ie_esc_user"])
93+
8694
def _run_script_and_get_paths(self, extra_args=""):
8795
"""
8896
Runs the CollectSystemInfo.ps1 script and parses its output for file paths.

0 commit comments

Comments
 (0)