qvm_backup_restore.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. #
  2. # The Qubes OS Project, http://www.qubes-os.org
  3. #
  4. # Copyright (C) 2016 Marek Marczykowski-Górecki
  5. # <marmarek@invisiblethingslab.com>
  6. #
  7. # This program is free software; you can redistribute it and/or modify
  8. # it under the terms of the GNU Lesser General Public License as published by
  9. # the Free Software Foundation; either version 2.1 of the License, or
  10. # (at your option) any later version.
  11. #
  12. # This program is distributed in the hope that it will be useful,
  13. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. # GNU Lesser General Public License for more details.
  16. #
  17. # You should have received a copy of the GNU Lesser General Public License along
  18. # with this program; if not, write to the Free Software Foundation, Inc.,
  19. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  20. '''Console frontend for backup restore code'''
  21. import getpass
  22. import sys
  23. from qubesadmin.backup.restore import BackupRestore
  24. import qubesadmin.exc
  25. import qubesadmin.tools
  26. import qubesadmin.utils
  27. parser = qubesadmin.tools.QubesArgumentParser()
  28. parser.add_argument("--verify-only", action="store_true",
  29. dest="verify_only", default=False,
  30. help="Verify backup integrity without restoring any "
  31. "data")
  32. parser.add_argument("--skip-broken", action="store_true", dest="skip_broken",
  33. default=False,
  34. help="Do not restore VMs that have missing TemplateVMs "
  35. "or NetVMs")
  36. parser.add_argument("--ignore-missing", action="store_true",
  37. dest="ignore_missing", default=False,
  38. help="Restore VMs even if their associated TemplateVMs "
  39. "and NetVMs are missing")
  40. parser.add_argument("--skip-conflicting", action="store_true",
  41. dest="skip_conflicting", default=False,
  42. help="Do not restore VMs that are already present on "
  43. "the host")
  44. parser.add_argument("--rename-conflicting", action="store_true",
  45. dest="rename_conflicting", default=False,
  46. help="Restore VMs that are already present on the host "
  47. "under different names")
  48. parser.add_argument("--replace-template", action="append",
  49. dest="replace_template", default=[],
  50. help="Restore VMs using another TemplateVM; syntax: "
  51. "old-template-name:new-template-name (may be "
  52. "repeated)")
  53. parser.add_argument("-x", "--exclude", action="append", dest="exclude",
  54. default=[],
  55. help="Skip restore of specified VM (may be repeated)")
  56. parser.add_argument("--skip-dom0-home", action="store_false", dest="dom0_home",
  57. default=True,
  58. help="Do not restore dom0 user home directory")
  59. parser.add_argument("--ignore-username-mismatch", action="store_true",
  60. dest="ignore_username_mismatch", default=False,
  61. help="Ignore dom0 username mismatch when restoring home "
  62. "directory")
  63. parser.add_argument("--ignore-size-limit", action="store_true",
  64. dest="ignore_size_limit", default=False,
  65. help="Ignore size limit calculated from backup metadata")
  66. parser.add_argument("-d", "--dest-vm", action="store", dest="appvm",
  67. help="Specify VM containing the backup to be restored")
  68. parser.add_argument("-p", "--passphrase-file", action="store",
  69. dest="pass_file", default=None,
  70. help="Read passphrase from file, or use '-' to read from stdin")
  71. parser.add_argument('backup_location', action='store',
  72. help="Backup directory name, or command to pipe from")
  73. parser.add_argument('vms', nargs='*', action='store', default=[],
  74. help='Restore only those VMs')
  75. def handle_broken(app, args, restore_info):
  76. '''Display information about problems with VMs selected for resetore'''
  77. there_are_conflicting_vms = False
  78. there_are_missing_templates = False
  79. there_are_missing_netvms = False
  80. dom0_username_mismatch = False
  81. for vm_info in restore_info.values():
  82. assert isinstance(vm_info, BackupRestore.VMToRestore)
  83. if BackupRestore.VMToRestore.EXCLUDED in \
  84. vm_info.problems:
  85. continue
  86. if BackupRestore.VMToRestore.MISSING_TEMPLATE in \
  87. vm_info.problems:
  88. there_are_missing_templates = True
  89. if BackupRestore.VMToRestore.MISSING_NETVM in \
  90. vm_info.problems:
  91. there_are_missing_netvms = True
  92. if BackupRestore.VMToRestore.ALREADY_EXISTS in \
  93. vm_info.problems:
  94. there_are_conflicting_vms = True
  95. if BackupRestore.Dom0ToRestore.USERNAME_MISMATCH in \
  96. vm_info.problems:
  97. dom0_username_mismatch = True
  98. if there_are_conflicting_vms:
  99. app.log.error(
  100. "*** There are VMs with conflicting names on the host! ***")
  101. if args.skip_conflicting:
  102. app.log.error(
  103. "Those VMs will not be restored. "
  104. "The host VMs will NOT be overwritten.")
  105. else:
  106. raise qubesadmin.exc.QubesException(
  107. "Remove VMs with conflicting names from the host "
  108. "before proceeding.\n"
  109. "Or use --skip-conflicting to restore only those VMs that "
  110. "do not exist on the host.\n"
  111. "Or use --rename-conflicting to restore those VMs under "
  112. "modified names (with numbers at the end).")
  113. if args.verify_only:
  114. app.log.info("The above VM archive(s) will be verified.")
  115. app.log.info("Existing VMs will NOT be removed or altered.")
  116. else:
  117. app.log.info("The above VMs will be copied and added to your system.")
  118. app.log.info("Exisiting VMs will NOT be removed.")
  119. if there_are_missing_templates:
  120. app.log.warning("*** One or more TemplateVMs are missing on the "
  121. "host! ***")
  122. if not (args.skip_broken or args.ignore_missing):
  123. raise qubesadmin.exc.QubesException(
  124. "Install them before proceeding with the restore."
  125. "Or pass: --skip-broken or --ignore-missing.")
  126. elif args.skip_broken:
  127. app.log.warning("Skipping broken entries: VMs that depend on "
  128. "missing TemplateVMs will NOT be restored.")
  129. elif args.ignore_missing:
  130. app.log.warning("Ignoring missing entries: VMs that depend "
  131. "on missing TemplateVMs will have default value "
  132. "assigned.")
  133. else:
  134. raise qubesadmin.exc.QubesException(
  135. "INTERNAL ERROR! Please report this to the Qubes OS team!")
  136. if there_are_missing_netvms:
  137. app.log.warning("*** One or more NetVMs are missing on the "
  138. "host! ***")
  139. if not (args.skip_broken or args.ignore_missing):
  140. raise qubesadmin.exc.QubesException(
  141. "Install them before proceeding with the restore."
  142. "Or pass: --skip-broken or --ignore-missing.")
  143. elif args.skip_broken:
  144. app.log.warning("Skipping broken entries: VMs that depend on "
  145. "missing NetVMs will NOT be restored.")
  146. elif args.ignore_missing:
  147. app.log.warning("Ignoring missing entries: VMs that depend "
  148. "on missing NetVMs will have default value assigned.")
  149. else:
  150. raise qubesadmin.exc.QubesException(
  151. "INTERNAL ERROR! Please report this to the Qubes OS team!")
  152. if 'dom0' in restore_info.keys() and args.dom0_home \
  153. and not args.verify_only:
  154. if dom0_username_mismatch:
  155. app.log.warning("*** Dom0 username mismatch! This can break "
  156. "some settings! ***")
  157. if not args.ignore_username_mismatch:
  158. raise qubesadmin.exc.QubesException(
  159. "Skip restoring the dom0 home directory "
  160. "(--skip-dom0-home), or pass "
  161. "--ignore-username-mismatch to continue anyway.")
  162. else:
  163. app.log.warning("Continuing as directed.")
  164. app.log.warning("NOTE: The archived dom0 home directory "
  165. "will be restored to a new directory "
  166. "'home-restore-<current-time>' "
  167. "created inside the dom0 home directory. Restored "
  168. "files should be copied or moved out of the new "
  169. "directory before using them.")
  170. def main(args=None, app=None):
  171. '''Main function of qvm-backup-restore'''
  172. # pylint: disable=too-many-return-statements
  173. args = parser.parse_args(args, app=app)
  174. appvm = None
  175. if args.appvm:
  176. try:
  177. appvm = args.app.domains[args.appvm]
  178. except KeyError:
  179. parser.error('no such domain: {!r}'.format(args.appvm))
  180. if args.pass_file is not None:
  181. pass_f = open(args.pass_file) if args.pass_file != "-" else sys.stdin
  182. passphrase = pass_f.readline().rstrip()
  183. if pass_f is not sys.stdin:
  184. pass_f.close()
  185. else:
  186. passphrase = getpass.getpass("Please enter the passphrase to verify "
  187. "and (if encrypted) decrypt the backup: ")
  188. args.app.log.info("Checking backup content...")
  189. try:
  190. backup = BackupRestore(args.app, args.backup_location,
  191. appvm, passphrase)
  192. except qubesadmin.exc.QubesException as e:
  193. parser.error_runtime(str(e))
  194. # unreachable - error_runtime will raise SystemExit
  195. return 1
  196. if args.ignore_missing:
  197. backup.options.use_default_template = True
  198. backup.options.use_default_netvm = True
  199. if args.replace_template:
  200. backup.options.replace_template = args.replace_template
  201. if args.rename_conflicting:
  202. backup.options.rename_conflicting = True
  203. if not args.dom0_home:
  204. backup.options.dom0_home = False
  205. if args.ignore_username_mismatch:
  206. backup.options.ignore_username_mismatch = True
  207. if args.ignore_size_limit:
  208. backup.options.ignore_size_limit = True
  209. if args.exclude:
  210. backup.options.exclude = args.exclude
  211. if args.verify_only:
  212. backup.options.verify_only = True
  213. restore_info = None
  214. try:
  215. restore_info = backup.get_restore_info()
  216. except qubesadmin.exc.QubesException as e:
  217. parser.error_runtime(str(e))
  218. if args.vms:
  219. # use original name here, not renamed
  220. backup.options.exclude += [vm_info.vm.name
  221. for vm_info in restore_info.values()
  222. if vm_info.vm.name not in args.vms]
  223. restore_info = backup.restore_info_verify(restore_info)
  224. print(backup.get_restore_summary(restore_info))
  225. try:
  226. handle_broken(args.app, args, restore_info)
  227. except qubesadmin.exc.QubesException as e:
  228. parser.error_runtime(str(e))
  229. if args.pass_file is None:
  230. if input("Do you want to proceed? [y/N] ").upper() != "Y":
  231. exit(0)
  232. try:
  233. backup.restore_do(restore_info)
  234. except qubesadmin.exc.QubesException as e:
  235. parser.error_runtime(str(e))
  236. if __name__ == '__main__':
  237. main()