Testing Applications On Windows Vista

  • Uploaded by: silkyc
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Testing Applications On Windows Vista as PDF for free.

More details

  • Words: 1,244
  • Pages: 18
Testing Applications on Windows Vista Edited By Michael Shaw

 

Guidance for Application Testers Before Testing Remember: Windows Vista is still in Beta. Remember: Windows Vista is still in Beta. Ensure all tests pass on Windows XP 



This helps to ensure only regression bugs are found

Test on XP as a non-Admin user 

This will eliminate complexity if the application has issues with non-Admin accounts

Bonus: Certified for Windows Vista Guidelines

Hardware Configuration 

Windows Vista Minimum Requirements  “Modern” CPU (800+MHz), 512MB RAM, DX9 GPU w/128MB onboard, 40GB HD, DVD



Recommended hardware for testing Windows Vista compatibility  Dual x64 CPU, 1GB RAM, WDDM GPU, 80GB HD, DVD



Using high end hardware for testing will help uncover more bugs  Multi-proc specific issues  Painting issues with desktop compositing enabled  Can be used for both x86 and x64 testing  Data Execution Prevention (DEP) support

OS Configuration 

Leave all functions enabled 



Create multiple users  

  

Search Indexer, UAC, System Restore, Sidebar, etc. 1x Administrator, 1x Non-Admin Do not rely on built-in “Administrator”

Ensure WDDM video w/Glass is being used Test both x86 and x64 - clean install Test x86 upgrade from XP to Windows Vista 

Install XP -> Install App -> Upgrade to Windows Vista -> Test App

Bonus: Enable NX protection. Enable AppVerifier. Enable 120 DPI.

Test Cases 

Non-Admin Install/Update  



Explorer thumbnail previews  



Content previews in explorer windows Rich preview handlers

Search indexing  



Should prompt for administrative credentials Shortcuts should appear for all users

Extend the indexer to include the contents of your data files Property Handlers

Default Programs / File Extensions 

Per user defaults

Guidance for Application Testers 

Test how your installation and update is done 

Use MSI 3.1 for Install and Update 



Self Updating Code – DON’T DO IT 





Alternate to MSI3.1 – call Update.exe marked as admin to do the update This is the LARGEST Application Compatibility problem with home consumer user applications Use MSI 3.1 updating procedures for this functionality

Examples of what not to do:  

Do not assume the user is an administrator Run Custom Actions in right context

Guidance for Application Testers (cont.) 

Test where the application data is stored The apps per user setup is performed at first run  Place per-user data into %LOCALAPPDATA% 







Roaming into %APPDATA%

Place Per-Machine (Shared) data into %ALLUSERPROFILE%

Examples of what not to do: Do not perform admin configuration at first run.  Do your admin operations during setup  Do not perform explicit Admin checks for Standard User applications 

User Account Controls (UAC) Guidance for Application Testers



Split-Token

By default, all users are running with a standard token  Admin accounts will fail when performing privileged operations even though they worked in the past 



Credential/Consent UI 

This UI is not automatable from a standard user process. There must be an elevated process or service to help drive the elevation UI.

UAC Guidance for Application Testers 

Process Isolation Integrity level is assigned to each process  Lower integrity processes are blocked from writing to & reading from higher integrity processes  Lower integrity processes are blocked from sending Windows messages to higher integrity processes 



See UIPI section in the app compat cookbook

UAC is the default configuration for Windows Vista (and beyond)

UAC Test Impact (cont.) 

File and Registry Virtualization/Data Redirection 







A list of protected system files, directories, registry locations when written to by a standard user will be virtualized to a per-user location. Each standard user will have a virtualized view of the FS and Registry Processes running elevated will not see virtualized FS & Registry Changing system setting from standard user process may succeed due to virtualization, but it doesn’t affect the system

UAC Test Guidance 

Test under the default OS environment Don’t turn UAC off  Move away from testing as the built-in administrator 



Test application for UAC Test component or application as standard user  Make sure all application functionalities are working 



Pay attention to update and anything that is disabled due to admin check.

UAC Testing Support (cont.) 

UAC User Level Library  

 



Identify the level of the user token Allow easy query of well-known groups and privileges Allow easy query and set of UAC policy Allow easy test case selection & pass/failure determination Available in native and managed code

Common Issues 

 

Dependencies on deprecated binaries/API’s  Kernel mode printer drivers, HLP files Assuming administrative rights Windows Resource Protection  



Do not attempt to modify system binaries Registry protection for system keys

Rendering / Painting / DPI scaling issues   

Black areas when not painting the entire hwnd Glass self-disable when a process attempts to paint outside it’s client area Clipped Text

Common Issues Cont. 

Per user vs. per machine settings 

  

Do not configure system settings on first launch

IE7+ Compatibility – Low Rights IE Doing work in DLLMain User Interface Privilege Isolation (UIPI) Lower privilege processes cannot send messages to higher privileged processes  SendMessage will still return success 



OS version checks

x64 Specific Issues   





No 16-Bit binary support No 32-Bit kernel mode driver support 64-Bit kernel mode drives must be signed Side by side application install conflicts Hardware architecture checks

UAC FAQ          

If I mark my app as “admin”, can I skip the elevation consent dialog? – No Can you modify the privilege of a running application? - No Will LUA elevate whenever a privileged API is used? – No, the entire process is either elevated or not How long does the elevated process last? Can it time out? – Life of the process Can I enable which users will use UAC? – Currently this is a per machine setting Does UAC apply to all processes and services? – Interactive processes only What areas of the Registry and File system get redirected? – HKLM\Software, %SystemRoot%, %ProgramFiles% Won’t Redirection de-motivate developers to fix their code? – Yes, it is a short term mitigation, not in 64bit What happens when installer detection fails? – The app runs as nonadmin Will UAC be going down-level? - No

Standard User Analyzer (SUA) 

Intended to predict whether an application would work correctly as a standard user.  



Example of Standard User Analyzer test pass:   



Identifies API calls that would fail if attempted by a user Identifies all access requiring elevated privileges Use SUA to launch your application as elevated Test application Analyze the log for API calls that will fail for standard user

http://www.microsoft.com/downloads/details.aspx?FamilyID=df59b474-c0b7-4422

     

Windows Vista Application Compatibility Cookbook Windows Vista Compatibility Troubleshooting Guide Certified for Windows Vista Guidelines Microsoft Application Verifier Tool Understanding UAC in Windows Vista Beta 2 DevReadiness.org 

    

Windows Vista ISV Jumpstart Toolkit

Technology Overview: Internet Explorer 7 Beta 3 Windows Vista User Experience Guidelines Windows Vista Application Compatibility Top 10 ways to light up your Windows Vista apps http://blogs.msdn.com/uac 

UAC Dev and Test information will be provided on the blog frequently.

Related Documents

Windows Vista
May 2020 22
Windows Vista
May 2020 3
Windows Vista
May 2020 9
Windows Vista
November 2019 29
Windows Vista
May 2020 29

More Documents from "Sumit Kumar"