276 lines
11 KiB
Python
276 lines
11 KiB
Python
|
#
|
||
|
# The Qubes OS Project, http://www.qubes-os.org
|
||
|
#
|
||
|
# Copyright (C) 2019 Marek Marczykowski-Górecki
|
||
|
# <marmarek@invisiblethingslab.com>
|
||
|
#
|
||
|
# This program is free software; you can redistribute it and/or modify
|
||
|
# it under the terms of the GNU Lesser General Public License as published by
|
||
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||
|
# (at your option) any later version.
|
||
|
#
|
||
|
# This program is distributed in the hope that it will be useful,
|
||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
# GNU Lesser General Public License for more details.
|
||
|
#
|
||
|
# You should have received a copy of the GNU Lesser General Public License along
|
||
|
# with this program; if not, write to the Free Software Foundation, Inc.,
|
||
|
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||
|
|
||
|
"""Handle backup extraction using DisposableVM"""
|
||
|
import datetime
|
||
|
import logging
|
||
|
import string
|
||
|
|
||
|
import subprocess
|
||
|
#import typing
|
||
|
import qubesadmin
|
||
|
import qubesadmin.exc
|
||
|
import qubesadmin.utils
|
||
|
import qubesadmin.vm
|
||
|
|
||
|
LOCKFILE = '/var/run/qubes/backup-paranoid-restore.lock'
|
||
|
|
||
|
Option = collections.namedtuple('Option', ('opts', 'handler'))
|
||
|
|
||
|
# Convenient functions for 'handler' value of Option object
|
||
|
# (see RestoreInDisposableVM.arguments):
|
||
|
|
||
|
def handle_store_true(option, value):
|
||
|
"""Handle argument enabling an option (action="store_true")"""
|
||
|
if value:
|
||
|
return [option.opts[0]]
|
||
|
return []
|
||
|
|
||
|
|
||
|
def handle_store_false(option, value):
|
||
|
"""Handle argument disabling an option (action="false")"""
|
||
|
if not value:
|
||
|
return [option.opts[0]]
|
||
|
return []
|
||
|
|
||
|
def handle_verbose(option, value):
|
||
|
"""Handle argument --quiet / --verbose options (action="count")"""
|
||
|
if option.opts[0] == '--verbose':
|
||
|
value -= 1 # verbose defaults to 1
|
||
|
return [option.opts[0]] * value
|
||
|
|
||
|
|
||
|
def handle_store(option, value):
|
||
|
"""Handle argument with arbitrary string value (action="store")"""
|
||
|
if value:
|
||
|
return [option.opts[0], str(value)]
|
||
|
return []
|
||
|
|
||
|
|
||
|
def handle_append(option, value):
|
||
|
"""Handle argument with a list of values (action="append")"""
|
||
|
return itertools.chain(*([option.opts[0], v] for v in value))
|
||
|
|
||
|
|
||
|
def skip(_option, _value):
|
||
|
"""Skip argument"""
|
||
|
return []
|
||
|
|
||
|
|
||
|
def handle_unsupported(option, value):
|
||
|
"""Reject argument as unsupported"""
|
||
|
if value:
|
||
|
raise NotImplementedError(
|
||
|
'{} option is not supported with --paranoid-mode'.format(
|
||
|
option.opts[0]))
|
||
|
return []
|
||
|
|
||
|
class RestoreInDisposableVM:
|
||
|
"""Perform backup restore with actual archive extraction isolated
|
||
|
within DisposableVM"""
|
||
|
#dispvm: typing.Optional[qubesadmin.vm.QubesVM]
|
||
|
|
||
|
#: map of args attr -> original option
|
||
|
arguments = {
|
||
|
'quiet': Option(('--quiet', '-q'), handle_verbose),
|
||
|
'verbose': Option(('--verbose', '-v'), handle_verbose),
|
||
|
'verify_only': Option(('--verify-only',), handle_store_true),
|
||
|
'skip_broken': Option(('--skip-broken',), handle_store_true),
|
||
|
'ignore_missing': Option(('--ignore-missing',), handle_store_true),
|
||
|
'skip_conflicting': Option(('--skip-conflicting',), handle_store_true),
|
||
|
'rename_conflicting': Option(('--rename-conflicting',),
|
||
|
handle_store_true),
|
||
|
'exclude': Option(('--exclude', '-x'), handle_append),
|
||
|
'dom0_home': Option(('--skip-dom0-home',), handle_store_false),
|
||
|
'ignore_username_mismatch': Option(('--ignore-username-mismatch',),
|
||
|
handle_store_true),
|
||
|
'ignore_size_limit': Option(('--ignore-size-limit',),
|
||
|
handle_store_true),
|
||
|
'compression': Option(('--compression-filter', '-Z'), handle_store),
|
||
|
'appvm': Option(('--dest-vm', '-d'), handle_store),
|
||
|
'pass_file': Option(('--passphrase-file', '-p'), handle_unsupported),
|
||
|
'location_is_service': Option(('--location-is-service',),
|
||
|
handle_store_true),
|
||
|
'paranoid_mode': Option(('--paranoid-mode', '--plan-b',), skip),
|
||
|
# make the verification easier, those don't really matter
|
||
|
'help': Option(('--help', '-h'), skip),
|
||
|
'force_root': Option(('--force-root',), skip),
|
||
|
}
|
||
|
|
||
|
def __init__(self, app, args):
|
||
|
"""
|
||
|
|
||
|
:param app: Qubes() instance
|
||
|
:param args: namespace instance as with qvm-backup-restore arguments
|
||
|
parsed. See :py:module:`qubesadmin.tools.qvm_backup_restore`.
|
||
|
"""
|
||
|
self.app = app
|
||
|
self.args = args
|
||
|
|
||
|
# only one backup restore is allowed at the time, use constant names
|
||
|
#: name of DisposableVM using to extract the backup
|
||
|
self.dispvm_name = 'disp-backup-restore'
|
||
|
#: tag given to this DisposableVM - qrexec policy is configured for it
|
||
|
self.dispvm_tag = 'backup-restore-mgmt'
|
||
|
#: tag automatically added to restored VMs
|
||
|
self.restored_tag = 'backup-restore-in-progress'
|
||
|
#: tag added to a VM storing the backup archive
|
||
|
self.storage_tag = 'backup-restore-storage'
|
||
|
|
||
|
self.terminal_app = ('xterm', '-hold', '-title', 'Backup restore', '-e')
|
||
|
|
||
|
self.dispvm = None
|
||
|
|
||
|
if args.appvm:
|
||
|
self.backup_storage_vm = self.app.domains[args.appvm]
|
||
|
else:
|
||
|
self.backup_storage_vm = self.app.domains['dom0']
|
||
|
|
||
|
self.storage_access_proc = None
|
||
|
self.storage_access_id = None
|
||
|
self.log = logging.getLogger('qubesadmin.backup.dispvm')
|
||
|
|
||
|
def clear_old_tags(self):
|
||
|
"""Remove tags from old restore operation"""
|
||
|
for domain in self.app.domains:
|
||
|
domain.tags.discard(self.restored_tag)
|
||
|
domain.tags.discard(self.dispvm_tag)
|
||
|
domain.tags.discard(self.storage_tag)
|
||
|
|
||
|
def create_dispvm(self):
|
||
|
"""Create DisposableVM used to restore"""
|
||
|
self.dispvm = self.app.add_new_vm('DispVM', self.dispvm_name, 'red',
|
||
|
template=self.app.management_dispvm)
|
||
|
self.dispvm.auto_cleanup = True
|
||
|
self.dispvm.features['tag-created-vm-with'] = self.restored_tag
|
||
|
|
||
|
def register_backup_source(self):
|
||
|
"""Tell backup archive holding VM we want this content.
|
||
|
|
||
|
This function registers a backup source, receives a token needed to
|
||
|
access it (stored in *storage_access_id* attribute). The access is
|
||
|
revoked when connection referenced in *storage_access_proc* attribute
|
||
|
is closed.
|
||
|
"""
|
||
|
self.storage_access_proc = self.backup_storage_vm.run_service(
|
||
|
'qubes.RegisterBackupLocation', stdin=subprocess.PIPE,
|
||
|
stdout=subprocess.PIPE)
|
||
|
self.storage_access_proc.stdin.write(
|
||
|
(self.args.backup_location.
|
||
|
replace("\r", "").replace("\n", "") + "\n").encode())
|
||
|
self.storage_access_proc.stdin.flush()
|
||
|
storage_access_id = self.storage_access_proc.stdout.readline().strip()
|
||
|
allowed_chars = (string.ascii_letters + string.digits).encode()
|
||
|
if not storage_access_id or \
|
||
|
not all(c in allowed_chars for c in storage_access_id):
|
||
|
if self.storage_access_proc.returncode == 127:
|
||
|
raise qubesadmin.exc.QubesException(
|
||
|
'Backup source registration failed - qubes-core-agent '
|
||
|
'package too old?')
|
||
|
raise qubesadmin.exc.QubesException(
|
||
|
'Backup source registration failed - got invalid id')
|
||
|
self.storage_access_id = storage_access_id.decode('ascii')
|
||
|
# keep connection open, closing it invalidates the access
|
||
|
|
||
|
self.backup_storage_vm.tags.add(self.storage_tag)
|
||
|
|
||
|
def invalidate_backup_access(self):
|
||
|
"""Revoke access to backup archive"""
|
||
|
self.backup_storage_vm.tags.discard(self.storage_tag)
|
||
|
self.storage_access_proc.stdin.close()
|
||
|
self.storage_access_proc.wait()
|
||
|
|
||
|
def prepare_inner_args(self):
|
||
|
"""Prepare arguments for inner (in-DispVM) qvm-backup-restore command"""
|
||
|
new_options = []
|
||
|
new_positional_args = []
|
||
|
|
||
|
for attr, opt in self.arguments.items():
|
||
|
if not hasattr(self.args, attr):
|
||
|
continue
|
||
|
new_options.extend(opt.handler(opt, getattr(self.args, attr)))
|
||
|
|
||
|
new_options.append('--location-is-service')
|
||
|
|
||
|
# backup location, replace by qrexec service to be called
|
||
|
new_positional_args.append(
|
||
|
'qubes.RestoreById+' + self.storage_access_id)
|
||
|
if self.args.vms:
|
||
|
new_positional_args.extend(self.args.vms)
|
||
|
|
||
|
return new_options + new_positional_args
|
||
|
|
||
|
def finalize_tags(self):
|
||
|
"""Make sure all the restored VMs are marked with
|
||
|
restored-from-backup-xxx tag, then remove backup-restore-in-progress
|
||
|
tag"""
|
||
|
self.app.domains.clear_cache()
|
||
|
for domain in self.app.domains:
|
||
|
if 'backup-restore-in-progress' not in domain.tags:
|
||
|
continue
|
||
|
if not any(t.startswith('restored-from-backup-')
|
||
|
for t in domain.tags):
|
||
|
self.log.warning('Restored domain %s was not tagged with '
|
||
|
'restored-from-backup-* tag',
|
||
|
domain.name)
|
||
|
# add fallback tag
|
||
|
domain.tags.add('restored-from-backup-at-{}'.format(
|
||
|
datetime.date.strftime(datetime.date.today(), '%F')))
|
||
|
domain.tags.discard('backup-restore-in-progress')
|
||
|
|
||
|
def run(self):
|
||
|
"""Run the backup restore operation"""
|
||
|
lock = qubesadmin.utils.LockFile(LOCKFILE, True)
|
||
|
lock.acquire()
|
||
|
try:
|
||
|
self.create_dispvm()
|
||
|
self.clear_old_tags()
|
||
|
self.register_backup_source()
|
||
|
args = self.prepare_inner_args()
|
||
|
self.dispvm.start()
|
||
|
self.dispvm.run_service_for_stdio('qubes.WaitForSession')
|
||
|
self.dispvm.tags.add(self.dispvm_tag)
|
||
|
self.dispvm.run_with_args(*self.terminal_app,
|
||
|
'qvm-backup-restore', *args,
|
||
|
stdout=subprocess.DEVNULL,
|
||
|
stderr=subprocess.DEVNULL)
|
||
|
except subprocess.CalledProcessError as e:
|
||
|
if e.returncode == 127:
|
||
|
raise qubesadmin.exc.QubesException(
|
||
|
'qvm-backup-restore tool or {} '
|
||
|
'missing in {} template, install qubes-core-admin-client '
|
||
|
'package there'.format(self.terminal_app[0],
|
||
|
self.dispvm.template.template.name)
|
||
|
)
|
||
|
raise qubesadmin.exc.QubesException(
|
||
|
'qvm-backup-restore failed with {}'.format(e.returncode))
|
||
|
finally:
|
||
|
if self.dispvm is not None:
|
||
|
# first revoke permission, then cleanup
|
||
|
self.dispvm.tags.discard(self.dispvm_tag)
|
||
|
# autocleanup removes the VM
|
||
|
try:
|
||
|
self.dispvm.kill()
|
||
|
except qubesadmin.exc.QubesVMNotStartedError:
|
||
|
# delete it manually
|
||
|
del self.app.domains[self.dispvm]
|
||
|
self.finalize_tags()
|
||
|
lock.release()
|