tools: add qvm-template-postprocess
Tool to be called from template's rpm post-installation script.
This commit is contained in:
parent
93d7249ef0
commit
2675d63579
@ -26,3 +26,8 @@ QREXEC_CLIENT = '/usr/lib/qubes/qrexec-client'
|
||||
QREXEC_CLIENT_VM = '/usr/bin/qrexec-client-vm'
|
||||
QUBESD_RECONNECT_DELAY = 1.0
|
||||
QREXEC_SERVICES_DIR = '/etc/qubes-rpc'
|
||||
|
||||
defaults = {
|
||||
'template_label': 'black',
|
||||
'shutdown_timeout': 60,
|
||||
}
|
||||
|
392
qubesadmin/tests/tools/qvm_template_postprocess.py
Normal file
392
qubesadmin/tests/tools/qvm_template_postprocess.py
Normal file
@ -0,0 +1,392 @@
|
||||
# -*- encoding: utf8 -*-
|
||||
#
|
||||
# The Qubes OS Project, http://www.qubes-os.org
|
||||
#
|
||||
# Copyright (C) 2017 Marek Marczykowski-Górecki
|
||||
# <marmarek@invisiblethingslab.com>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Lesser General Public License as published by
|
||||
# the Free Software Foundation; either version 2.1 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Lesser General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU Lesser General Public License along
|
||||
# with this program; if not, see <http://www.gnu.org/licenses/>.
|
||||
import asyncio
|
||||
import os
|
||||
import subprocess
|
||||
import tempfile
|
||||
from unittest import mock
|
||||
import qubesadmin.tests
|
||||
import qubesadmin.tools.qvm_template_postprocess
|
||||
|
||||
|
||||
class QubesLocalMock(qubesadmin.tests.QubesTest):
|
||||
def __init__(self):
|
||||
super(QubesLocalMock, self).__init__()
|
||||
self.__class__ = qubesadmin.app.QubesLocal
|
||||
|
||||
qubesd_call = qubesadmin.tests.QubesTest.qubesd_call
|
||||
run_service = qubesadmin.tests.QubesTest.run_service
|
||||
|
||||
class TC_00_qvm_template_postprocess(qubesadmin.tests.QubesTestCase):
|
||||
def setUp(self):
|
||||
super(TC_00_qvm_template_postprocess, self).setUp()
|
||||
self.source_dir = tempfile.TemporaryDirectory()
|
||||
|
||||
def tearDown(self):
|
||||
try:
|
||||
self.source_dir.cleanup()
|
||||
except FileNotFoundError:
|
||||
pass
|
||||
super(TC_00_qvm_template_postprocess, self).tearDown()
|
||||
|
||||
def test_000_import_root_img_raw(self):
|
||||
root_img = os.path.join(self.source_dir.name, 'root.img')
|
||||
volume_data = b'volume data'
|
||||
with open(root_img, 'wb') as f:
|
||||
f.write(volume_data)
|
||||
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.volume.List', None,
|
||||
None)] = \
|
||||
b'0\0root\nprivate\nvolatile\nkernel\n'
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.volume.Resize', 'root',
|
||||
str(len(volume_data)).encode())] = \
|
||||
b'0\0'
|
||||
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.volume.Import', 'root',
|
||||
volume_data)] = b'0\0'
|
||||
vm = self.app.domains['test-vm']
|
||||
qubesadmin.tools.qvm_template_postprocess.import_root_img(
|
||||
vm, self.source_dir.name)
|
||||
self.assertAllCalled()
|
||||
|
||||
def test_001_import_root_img_tar(self):
|
||||
root_img = os.path.join(self.source_dir.name, 'root.img')
|
||||
volume_data = b'volume data' * 1000
|
||||
with open(root_img, 'wb') as f:
|
||||
f.write(volume_data)
|
||||
|
||||
subprocess.check_call(['tar', 'cf', 'root.img.tar', 'root.img'],
|
||||
cwd=self.source_dir.name)
|
||||
subprocess.check_call(['split', '-d', '-b', '1024', 'root.img.tar',
|
||||
'root.img.part.'], cwd=self.source_dir.name)
|
||||
os.unlink(root_img)
|
||||
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.volume.List', None,
|
||||
None)] = \
|
||||
b'0\0root\nprivate\nvolatile\nkernel\n'
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.volume.Resize', 'root',
|
||||
str(len(volume_data)).encode())] = \
|
||||
b'0\0'
|
||||
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.volume.Import', 'root',
|
||||
volume_data)] = b'0\0'
|
||||
vm = self.app.domains['test-vm']
|
||||
qubesadmin.tools.qvm_template_postprocess.import_root_img(
|
||||
vm, self.source_dir.name)
|
||||
self.assertAllCalled()
|
||||
|
||||
def test_002_import_root_img_no_overwrite(self):
|
||||
self.app.qubesd_connection_type = 'socket'
|
||||
|
||||
template_dir = os.path.join(self.source_dir.name, 'vm-templates',
|
||||
'test-vm')
|
||||
os.makedirs(template_dir)
|
||||
root_img = os.path.join(template_dir, 'root.img')
|
||||
volume_data = b'volume data'
|
||||
with open(root_img, 'wb') as f:
|
||||
f.write(volume_data)
|
||||
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.volume.List', None, None)] = \
|
||||
b'0\0root\nprivate\nvolatile\nkernel\n'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.volume.Info', 'root', None)] = \
|
||||
b'0\0pool=default\nvid=vm-templates/test-vm/root\n'
|
||||
self.app.expected_calls[
|
||||
('dom0', 'admin.pool.List', None, None)] = \
|
||||
b'0\0default\n'
|
||||
self.app.expected_calls[
|
||||
('dom0', 'admin.pool.Info', 'default', None)] = \
|
||||
b'0\0driver=file\ndir_path=' + self.source_dir.name.encode() + b'\n'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.volume.Resize', 'root',
|
||||
str(len(volume_data)).encode())] = \
|
||||
b'0\0'
|
||||
|
||||
vm = self.app.domains['test-vm']
|
||||
qubesadmin.tools.qvm_template_postprocess.import_root_img(
|
||||
vm, template_dir)
|
||||
self.assertAllCalled()
|
||||
|
||||
def test_010_import_appmenus(self):
|
||||
with open(os.path.join(self.source_dir.name,
|
||||
'vm-whitelisted-appmenus.list'), 'w') as f:
|
||||
f.write('org.gnome.Terminal.desktop\n')
|
||||
f.write('firefox.desktop\n')
|
||||
with open(os.path.join(self.source_dir.name,
|
||||
'whitelisted-appmenus.list'), 'w') as f:
|
||||
f.write('org.gnome.Terminal.desktop\n')
|
||||
f.write('org.gnome.Software.desktop\n')
|
||||
f.write('gnome-control-center.desktop\n')
|
||||
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
|
||||
vm = self.app.domains['test-vm']
|
||||
with mock.patch('subprocess.check_call') as mock_proc:
|
||||
qubesadmin.tools.qvm_template_postprocess.import_appmenus(
|
||||
vm, self.source_dir.name)
|
||||
self.assertEqual(mock_proc.mock_calls, [
|
||||
mock.call(['qvm-appmenus',
|
||||
'--set-default-whitelist=' + os.path.join(self.source_dir.name,
|
||||
'vm-whitelisted-appmenus.list'), 'test-vm']),
|
||||
mock.call(['qvm-appmenus', '--set-whitelist=' + os.path.join(
|
||||
self.source_dir.name, 'whitelisted-appmenus.list'), 'test-vm']),
|
||||
])
|
||||
self.assertAllCalled()
|
||||
|
||||
@mock.patch('grp.getgrnam')
|
||||
@mock.patch('os.getuid')
|
||||
def test_011_import_appmenus_as_root(self, mock_getuid, mock_getgrnam):
|
||||
with open(os.path.join(self.source_dir.name,
|
||||
'vm-whitelisted-appmenus.list'), 'w') as f:
|
||||
f.write('org.gnome.Terminal.desktop\n')
|
||||
f.write('firefox.desktop\n')
|
||||
with open(os.path.join(self.source_dir.name,
|
||||
'whitelisted-appmenus.list'), 'w') as f:
|
||||
f.write('org.gnome.Terminal.desktop\n')
|
||||
f.write('org.gnome.Software.desktop\n')
|
||||
f.write('gnome-control-center.desktop\n')
|
||||
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
|
||||
mock_getuid.return_value = 0
|
||||
mock_getgrnam.configure_mock(**{
|
||||
'return_value.gr_mem.__getitem__.return_value': 'user'
|
||||
})
|
||||
|
||||
vm = self.app.domains['test-vm']
|
||||
with mock.patch('subprocess.check_call') as mock_proc:
|
||||
qubesadmin.tools.qvm_template_postprocess.import_appmenus(
|
||||
vm, self.source_dir.name)
|
||||
self.assertEqual(mock_proc.mock_calls, [
|
||||
mock.call(['runuser', '-u', 'user', '--', 'env', 'DISPLAY=:0',
|
||||
'qvm-appmenus',
|
||||
'--set-default-whitelist=' + os.path.join(self.source_dir.name,
|
||||
'vm-whitelisted-appmenus.list'), 'test-vm']),
|
||||
mock.call(['runuser', '-u', 'user', '--', 'env', 'DISPLAY=:0',
|
||||
'qvm-appmenus', '--set-whitelist=' + os.path.join(
|
||||
self.source_dir.name, 'whitelisted-appmenus.list'), 'test-vm']),
|
||||
])
|
||||
self.assertAllCalled()
|
||||
|
||||
@mock.patch('grp.getgrnam')
|
||||
@mock.patch('os.getuid')
|
||||
def test_012_import_appmenus_missing_user(self, mock_getuid, mock_getgrnam):
|
||||
with open(os.path.join(self.source_dir.name,
|
||||
'vm-whitelisted-appmenus.list'), 'w') as f:
|
||||
f.write('org.gnome.Terminal.desktop\n')
|
||||
f.write('firefox.desktop\n')
|
||||
with open(os.path.join(self.source_dir.name,
|
||||
'whitelisted-appmenus.list'), 'w') as f:
|
||||
f.write('org.gnome.Terminal.desktop\n')
|
||||
f.write('org.gnome.Software.desktop\n')
|
||||
f.write('gnome-control-center.desktop\n')
|
||||
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
|
||||
mock_getuid.return_value = 0
|
||||
mock_getgrnam.side_effect = KeyError
|
||||
|
||||
vm = self.app.domains['test-vm']
|
||||
with mock.patch('subprocess.check_call') as mock_proc:
|
||||
qubesadmin.tools.qvm_template_postprocess.import_appmenus(
|
||||
vm, self.source_dir.name)
|
||||
self.assertEqual(mock_proc.mock_calls, [])
|
||||
self.assertAllCalled()
|
||||
|
||||
def add_new_vm_side_effect(self, *args, **kwargs):
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.domains.clear_cache()
|
||||
return self.app.domains['test-vm']
|
||||
|
||||
@mock.patch('qubesadmin.tools.qvm_template_postprocess.import_appmenus')
|
||||
@mock.patch('qubesadmin.tools.qvm_template_postprocess.import_root_img')
|
||||
def test_020_post_install(self, mock_import_root_img,
|
||||
mock_import_appmenus):
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0'
|
||||
self.app.add_new_vm = mock.Mock(side_effect=self.add_new_vm_side_effect)
|
||||
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.property.Set', 'netvm', b'')] = b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.property.Reset', 'netvm', None)] = b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.Start', None, None)] = b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.Shutdown', None, None)] = b'0\0'
|
||||
|
||||
if qubesadmin.tools.qvm_template_postprocess.have_events:
|
||||
patch_domain_shutdown = mock.patch(
|
||||
'qubesadmin.events.utils.wait_for_domain_shutdown')
|
||||
self.addCleanup(patch_domain_shutdown.stop)
|
||||
mock_domain_shutdown = patch_domain_shutdown.start()
|
||||
else:
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
|
||||
ret = qubesadmin.tools.qvm_template_postprocess.main([
|
||||
'--really', 'post-install', 'test-vm', self.source_dir.name],
|
||||
app=self.app)
|
||||
self.assertEqual(ret, 0)
|
||||
self.app.add_new_vm.assert_called_once_with('TemplateVM',
|
||||
name='test-vm', label='black')
|
||||
mock_import_root_img.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], self.source_dir.name)
|
||||
mock_import_appmenus.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], self.source_dir.name)
|
||||
if qubesadmin.tools.qvm_template_postprocess.have_events:
|
||||
mock_domain_shutdown.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], 60)
|
||||
self.assertEqual(self.app.service_calls, [
|
||||
('test-vm', 'qubes.PostInstall', {}),
|
||||
('test-vm', 'qubes.PostInstall', b''),
|
||||
])
|
||||
self.assertAllCalled()
|
||||
|
||||
@mock.patch('qubesadmin.tools.qvm_template_postprocess.import_appmenus')
|
||||
@mock.patch('qubesadmin.tools.qvm_template_postprocess.import_root_img')
|
||||
def test_021_post_install_reinstall(self, mock_import_root_img,
|
||||
mock_import_appmenus):
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.add_new_vm = mock.Mock()
|
||||
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.property.Set', 'netvm', b'')] = b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.property.Reset', 'netvm', None)] = b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.Start', None, None)] = b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.Shutdown', None, None)] = b'0\0'
|
||||
|
||||
if qubesadmin.tools.qvm_template_postprocess.have_events:
|
||||
patch_domain_shutdown = mock.patch(
|
||||
'qubesadmin.events.utils.wait_for_domain_shutdown')
|
||||
self.addCleanup(patch_domain_shutdown.stop)
|
||||
mock_domain_shutdown = patch_domain_shutdown.start()
|
||||
else:
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
|
||||
ret = qubesadmin.tools.qvm_template_postprocess.main([
|
||||
'--really', 'post-install', 'test-vm', self.source_dir.name],
|
||||
app=self.app)
|
||||
self.assertEqual(ret, 0)
|
||||
self.assertFalse(self.app.add_new_vm.called)
|
||||
mock_import_root_img.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], self.source_dir.name)
|
||||
mock_import_appmenus.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], self.source_dir.name)
|
||||
if qubesadmin.tools.qvm_template_postprocess.have_events:
|
||||
mock_domain_shutdown.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], 60)
|
||||
self.assertEqual(self.app.service_calls, [
|
||||
('test-vm', 'qubes.PostInstall', {}),
|
||||
('test-vm', 'qubes.PostInstall', b''),
|
||||
])
|
||||
self.assertAllCalled()
|
||||
|
||||
@mock.patch('qubesadmin.tools.qvm_template_postprocess.import_appmenus')
|
||||
@mock.patch('qubesadmin.tools.qvm_template_postprocess.import_root_img')
|
||||
def test_022_post_install_skip_start(self, mock_import_root_img,
|
||||
mock_import_appmenus):
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.add_new_vm = mock.Mock()
|
||||
|
||||
if qubesadmin.tools.qvm_template_postprocess.have_events:
|
||||
patch_domain_shutdown = mock.patch(
|
||||
'qubesadmin.events.utils.wait_for_domain_shutdown')
|
||||
self.addCleanup(patch_domain_shutdown.stop)
|
||||
mock_domain_shutdown = patch_domain_shutdown.start()
|
||||
|
||||
ret = qubesadmin.tools.qvm_template_postprocess.main([
|
||||
'--really', '--skip-start', 'post-install', 'test-vm',
|
||||
self.source_dir.name],
|
||||
app=self.app)
|
||||
self.assertEqual(ret, 0)
|
||||
self.assertFalse(self.app.add_new_vm.called)
|
||||
mock_import_root_img.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], self.source_dir.name)
|
||||
mock_import_appmenus.assert_called_once_with(self.app.domains[
|
||||
'test-vm'], self.source_dir.name)
|
||||
if qubesadmin.tools.qvm_template_postprocess.have_events:
|
||||
self.assertFalse(mock_domain_shutdown.called)
|
||||
self.assertEqual(self.app.service_calls, [])
|
||||
self.assertAllCalled()
|
||||
|
||||
def test_030_pre_remove(self):
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n'
|
||||
self.app.expected_calls[('test-vm', 'admin.vm.Remove', None, None)] = \
|
||||
b'0\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.property.Get', 'template', None)] = \
|
||||
b'2\0QubesNoSuchPropertyError\0\0invalid property \'template\' of ' \
|
||||
b'test-vm\0'
|
||||
|
||||
ret = qubesadmin.tools.qvm_template_postprocess.main([
|
||||
'--really', 'pre-remove', 'test-vm',
|
||||
self.source_dir.name],
|
||||
app=self.app)
|
||||
self.assertEqual(ret, 0)
|
||||
self.assertEqual(self.app.service_calls, [])
|
||||
self.assertAllCalled()
|
||||
|
||||
def test_031_pre_remove_existing_appvm(self):
|
||||
self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
|
||||
b'0\0test-vm class=TemplateVM state=Halted\n' \
|
||||
b'test-vm2 class=AppVM state=Halted\n'
|
||||
self.app.expected_calls[
|
||||
('test-vm', 'admin.vm.property.Get', 'template', None)] = \
|
||||
b'2\0QubesNoSuchPropertyError\0\0invalid property \'template\' of ' \
|
||||
b'test-vm\0'
|
||||
self.app.expected_calls[
|
||||
('test-vm2', 'admin.vm.property.Get', 'template', None)] = \
|
||||
b'0\0default=no type=vm test-vm'
|
||||
|
||||
with self.assertRaises(SystemExit):
|
||||
qubesadmin.tools.qvm_template_postprocess.main([
|
||||
'--really', 'pre-remove', 'test-vm',
|
||||
self.source_dir.name],
|
||||
app=self.app)
|
||||
self.assertEqual(self.app.service_calls, [])
|
||||
self.assertAllCalled()
|
||||
|
||||
def test_040_missing_really(self):
|
||||
with self.assertRaises(SystemExit):
|
||||
qubesadmin.tools.qvm_template_postprocess.main([
|
||||
'post-install', 'test-vm', self.source_dir.name],
|
||||
app=self.app)
|
||||
self.assertAllCalled()
|
229
qubesadmin/tools/qvm_template_postprocess.py
Normal file
229
qubesadmin/tools/qvm_template_postprocess.py
Normal file
@ -0,0 +1,229 @@
|
||||
#
|
||||
# The Qubes OS Project, https://www.qubes-os.org/
|
||||
#
|
||||
# Copyright (C) 2016 Marek Marczykowski-Górecki
|
||||
# <marmarek@invisiblethingslab.com>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Lesser General Public License as published by
|
||||
# the Free Software Foundation; either version 2.1 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Lesser General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU Lesser General Public License along
|
||||
# with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
|
||||
''' Tool for importing rpm-installed template'''
|
||||
|
||||
import asyncio
|
||||
import glob
|
||||
import os
|
||||
|
||||
import shutil
|
||||
import subprocess
|
||||
|
||||
import sys
|
||||
|
||||
import grp
|
||||
|
||||
import time
|
||||
|
||||
import qubesadmin
|
||||
import qubesadmin.exc
|
||||
import qubesadmin.tools
|
||||
try:
|
||||
# pylint: disable=wrong-import-position
|
||||
import qubesadmin.events.utils
|
||||
have_events = True
|
||||
except ImportError:
|
||||
have_events = False
|
||||
|
||||
parser = qubesadmin.tools.QubesArgumentParser(
|
||||
description='Postprocess template package')
|
||||
parser.add_argument('--really', action='store_true', default=False,
|
||||
help='Really perform the action, YOU SHOULD REALLY KNOW WHAT YOU ARE DOING')
|
||||
parser.add_argument('--skip-start', action='store_true',
|
||||
help='Do not start the VM - do not retrieve menu entries etc.')
|
||||
parser.add_argument('--keep-source', action='store_true',
|
||||
help='Do not remove imported data')
|
||||
parser.add_argument('action', choices=['post-install', 'pre-remove'],
|
||||
help='Action to perform')
|
||||
parser.add_argument('name', action='store',
|
||||
help='Template name')
|
||||
parser.add_argument('dir', action='store',
|
||||
help='Template directory')
|
||||
|
||||
|
||||
def move_if_exists(source, dest_dir):
|
||||
'''Move file/directory if exists'''
|
||||
if os.path.exists(source):
|
||||
shutil.move(source, os.path.join(dest_dir, os.path.basename(source)))
|
||||
|
||||
|
||||
def get_root_img_size(source_dir):
|
||||
'''Extract size of root.img to be imported'''
|
||||
root_path = os.path.join(source_dir, 'root.img')
|
||||
if os.path.exists(root_path + '.part.00'):
|
||||
# get just file root_size from the tar header
|
||||
p = subprocess.Popen(['tar', 'tvf', root_path + '.part.00'],
|
||||
stdout=subprocess.PIPE, stderr=subprocess.DEVNULL)
|
||||
(stdout, _) = p.communicate()
|
||||
# -rw-r--r-- 0/0 1073741824 1970-01-01 01:00 root.img
|
||||
root_size = int(stdout.split()[2])
|
||||
elif os.path.exists(root_path):
|
||||
root_size = os.path.getsize(root_path)
|
||||
else:
|
||||
raise qubesadmin.exc.QubesException('root.img not found')
|
||||
return root_size
|
||||
|
||||
|
||||
def import_root_img(vm, source_dir):
|
||||
'''Import root.img into VM object'''
|
||||
|
||||
root_size = get_root_img_size(source_dir)
|
||||
vm.volumes['root'].resize(root_size)
|
||||
|
||||
root_path = os.path.join(source_dir, 'root.img')
|
||||
if os.path.exists(root_path + '.part.00'):
|
||||
input_files = glob.glob(root_path + '.part.*')
|
||||
cat = subprocess.Popen(['cat'] + sorted(input_files),
|
||||
stdout=subprocess.PIPE)
|
||||
tar = subprocess.Popen(['tar', 'xSOf', '-'],
|
||||
stdin=cat.stdout,
|
||||
stdout=subprocess.PIPE)
|
||||
vm.volumes['root'].import_data(stream=tar.stdout)
|
||||
if tar.wait() != 0:
|
||||
raise qubesadmin.exc.QubesException('root.img extraction failed')
|
||||
if cat.wait() != 0:
|
||||
raise qubesadmin.exc.QubesException('root.img extraction failed')
|
||||
cat.stdout.close()
|
||||
tar.stdout.close()
|
||||
elif os.path.exists(root_path):
|
||||
if vm.app.qubesd_connection_type == 'socket':
|
||||
# check if root.img was already overwritten, i.e. if the source
|
||||
# and destination paths are the same
|
||||
vid = vm.volumes['root'].vid
|
||||
pool = vm.app.pools[vm.volumes['root'].pool]
|
||||
if pool.driver == 'file' and root_path == os.path.join(
|
||||
pool.config['dir_path'], vid + '.img'):
|
||||
vm.log.info('root.img already in place, do not re-import')
|
||||
return
|
||||
with open(root_path, 'rb') as root_file:
|
||||
vm.volumes['root'].import_data(stream=root_file)
|
||||
|
||||
|
||||
def import_appmenus(vm, source_dir):
|
||||
'''Import appmenus settings into VM object (later: GUI VM)'''
|
||||
if os.getuid() == 0:
|
||||
try:
|
||||
qubes_group = grp.getgrnam('qubes')
|
||||
user = qubes_group.gr_mem[0]
|
||||
cmd_prefix = ['runuser', '-u', user, '--', 'env', 'DISPLAY=:0']
|
||||
except KeyError as e:
|
||||
vm.log.warning('Default user not found, not importing appmenus: ' +
|
||||
str(e))
|
||||
return
|
||||
else:
|
||||
cmd_prefix = []
|
||||
|
||||
# TODO: change this to qrexec calls to GUI VM, when GUI VM will be
|
||||
# implemented
|
||||
subprocess.check_call(cmd_prefix + ['qvm-appmenus',
|
||||
'--set-default-whitelist={}'.format(os.path.join(source_dir,
|
||||
'vm-whitelisted-appmenus.list')), vm.name])
|
||||
subprocess.check_call(cmd_prefix + ['qvm-appmenus',
|
||||
'--set-whitelist={}'.format(os.path.join(source_dir,
|
||||
'whitelisted-appmenus.list')), vm.name])
|
||||
|
||||
|
||||
def post_install(args):
|
||||
'''Handle post-installation tasks'''
|
||||
|
||||
app = args.app
|
||||
try:
|
||||
# reinstall
|
||||
vm = app.domains[args.name]
|
||||
except KeyError:
|
||||
if app.qubesd_connection_type == 'socket' and \
|
||||
args.dir == '/var/lib/qubes/vm-templates/' + args.name:
|
||||
# vm.create_on_disk() need to create the directory on its own,
|
||||
# move it away for from its way
|
||||
tmp_sourcedir = os.path.join('/var/lib/qubes/vm-templates',
|
||||
'tmp-' + args.name)
|
||||
shutil.move(args.dir, tmp_sourcedir)
|
||||
args.dir = tmp_sourcedir
|
||||
|
||||
vm = app.add_new_vm('TemplateVM',
|
||||
name=args.name,
|
||||
label=qubesadmin.config.defaults['template_label'])
|
||||
|
||||
vm.log.info('Importing data')
|
||||
import_root_img(vm, args.dir)
|
||||
import_appmenus(vm, args.dir)
|
||||
|
||||
if not args.skip_start:
|
||||
# just created, so no need to save previous value - we know what it was
|
||||
vm.netvm = None
|
||||
vm.start()
|
||||
try:
|
||||
vm.run_service_for_stdio('qubes.PostInstall')
|
||||
except qubesadmin.exc.QubesVMError:
|
||||
vm.log.error('qubes.PostInstall service failed')
|
||||
vm.shutdown()
|
||||
if have_events:
|
||||
try:
|
||||
# pylint: disable=no-member
|
||||
qubesadmin.events.utils.wait_for_domain_shutdown(vm,
|
||||
qubesadmin.config.defaults['shutdown_timeout'])
|
||||
except qubesadmin.exc.QubesVMShutdownTimeout:
|
||||
vm.kill()
|
||||
asyncio.get_event_loop().close()
|
||||
else:
|
||||
timeout = qubesadmin.config.defaults['shutdown_timeout']
|
||||
while timeout >= 0:
|
||||
if vm.is_halted():
|
||||
break
|
||||
time.sleep(1)
|
||||
timeout -= 1
|
||||
if not vm.is_halted():
|
||||
vm.kill()
|
||||
|
||||
vm.netvm = qubesadmin.DEFAULT
|
||||
|
||||
return 0
|
||||
|
||||
|
||||
def pre_remove(args):
|
||||
'''Handle pre-removal tasks'''
|
||||
app = args.app
|
||||
try:
|
||||
tpl = app.domains[args.name]
|
||||
except KeyError:
|
||||
parser.error('Qube with this name do not exist')
|
||||
for appvm in tpl.appvms:
|
||||
parser.error('Qube {} use this template'.format(appvm.name))
|
||||
|
||||
del app.domains[args.name]
|
||||
return 0
|
||||
|
||||
|
||||
def main(args=None, app=None):
|
||||
'''Main function of qvm-template-postprocess'''
|
||||
args = parser.parse_args(args, app=app)
|
||||
if not args.really:
|
||||
parser.error('Do not call this tool directly.')
|
||||
if args.action == 'post-install':
|
||||
return post_install(args)
|
||||
elif args.action == 'pre-remove':
|
||||
pre_remove(args)
|
||||
else:
|
||||
parser.error('Unknown action')
|
||||
return 0
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(main())
|
Loading…
Reference in New Issue
Block a user