Merge branch '20171107-tests-backup-api-misc'

* 20171107-tests-backup-api-misc:
  test: make race condition on xterm close less likely
  tests/backupcompatibility: fix handling 'internal' property
  backup: fix handling target write error (like no disk space)
  tests/backupcompatibility: drop R1 format tests
  backup: use offline_mode for backup collection
  qubespolicy: fix handling '$adminvm' target with ask action
  app: drop reference to libvirt object after undefining it
  vm: always log startup fail
  api: do not log handled errors sent to a client
  tests/backups: convert to new restore handling - using qubesadmin module
  app: clarify error message on failed domain remove (used somewhere)
  Fix qubes-core.service ordering
This commit is contained in:
Marek Marczykowski-Górecki 2017-11-20 22:52:26 +01:00
commit 2c6c766968
No known key found for this signature in database
GPG Key ID: 063938BA42CFA724
10 changed files with 355 additions and 346 deletions

View File

@ -1,6 +1,6 @@
[Unit] [Unit]
Description=Qubes Dom0 startup setup Description=Qubes Dom0 startup setup
After=qubes-db-dom0.service libvirtd.service xenconsoled.service After=qubes-db-dom0.service libvirtd.service xenconsoled.service qubesd.service qubes-qmemman.service
# Cover legacy init.d script # Cover legacy init.d script
[Service] [Service]

View File

@ -285,9 +285,6 @@ class QubesDaemonProtocol(asyncio.Protocol):
if self.debug: if self.debug:
self.app.log.exception(msg, self.app.log.exception(msg,
err, src, meth, dest, arg, len(untrusted_payload)) err, src, meth, dest, arg, len(untrusted_payload))
else:
self.app.log.info(msg,
err, src, meth, dest, arg, len(untrusted_payload))
if self.transport is not None: if self.transport is not None:
self.send_exception(err) self.send_exception(err)
self.transport.write_eof() self.transport.write_eof()

View File

@ -484,6 +484,8 @@ class VMCollection(object):
self.app.fire_event('domain-pre-delete', pre_event=True, vm=vm) self.app.fire_event('domain-pre-delete', pre_event=True, vm=vm)
try: try:
vm.libvirt_domain.undefine() vm.libvirt_domain.undefine()
# pylint: disable=protected-access
vm._libvirt_domain = None
except libvirt.libvirtError as e: except libvirt.libvirtError as e:
if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN: if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
# already undefined # already undefined
@ -1196,7 +1198,9 @@ class Qubes(qubes.PropertyHolder):
self.log.error( self.log.error(
'Cannot remove %s, used by %s.%s', 'Cannot remove %s, used by %s.%s',
vm, obj, prop.__name__) vm, obj, prop.__name__)
raise qubes.exc.QubesVMInUseError(vm) raise qubes.exc.QubesVMInUseError(vm,
'Domain is in use: {!r}; details in system log'
.format(vm.name))
except AttributeError: except AttributeError:
pass pass

View File

@ -23,6 +23,7 @@ from __future__ import unicode_literals
import itertools import itertools
import logging import logging
import functools import functools
import string
import termios import termios
import asyncio import asyncio
@ -665,6 +666,13 @@ class Backup(object):
raise raise
if proc.returncode: if proc.returncode:
if proc.stderr is not None:
proc_stderr = (yield from proc.stderr.read())
proc_stderr = proc_stderr.decode('ascii', errors='ignore')
proc_stderr = ''.join(
c for c in proc_stderr if c in string.printable and
c not in '\r\n%{}')
error_message += ': ' + proc_stderr
raise qubes.exc.QubesException(error_message) raise qubes.exc.QubesException(error_message)
@staticmethod @staticmethod
@ -694,7 +702,7 @@ class Backup(object):
self.tmpdir = tempfile.mkdtemp() self.tmpdir = tempfile.mkdtemp()
shutil.copy(qubes_xml, os.path.join(self.tmpdir, 'qubes.xml')) shutil.copy(qubes_xml, os.path.join(self.tmpdir, 'qubes.xml'))
qubes_xml = os.path.join(self.tmpdir, 'qubes.xml') qubes_xml = os.path.join(self.tmpdir, 'qubes.xml')
backup_app = qubes.Qubes(qubes_xml) backup_app = qubes.Qubes(qubes_xml, offline_mode=True)
backup_app.events_enabled = False backup_app.events_enabled = False
files_to_backup = self._files_to_backup files_to_backup = self._files_to_backup
@ -709,6 +717,7 @@ class Backup(object):
backup_app.domains[qid].features['backup-path'] = vm_info.subdir backup_app.domains[qid].features['backup-path'] = vm_info.subdir
backup_app.domains[qid].features['backup-size'] = vm_info.size backup_app.domains[qid].features['backup-size'] = vm_info.size
backup_app.save() backup_app.save()
del backup_app
vmproc = None vmproc = None
if self.target_vm is not None: if self.target_vm is not None:
@ -716,7 +725,9 @@ class Backup(object):
# If APPVM, STDOUT is a PIPE # If APPVM, STDOUT is a PIPE
read_fd, write_fd = os.pipe() read_fd, write_fd = os.pipe()
vmproc = yield from self.target_vm.run_service('qubes.Backup', vmproc = yield from self.target_vm.run_service('qubes.Backup',
stdin=read_fd, stderr=subprocess.PIPE) stdin=read_fd,
stderr=subprocess.PIPE,
stdout=subprocess.DEVNULL)
os.close(read_fd) os.close(read_fd)
os.write(write_fd, (self.target_dir. os.write(write_fd, (self.target_dir.
replace("\r", "").replace("\n", "") + "\n").encode()) replace("\r", "").replace("\n", "") + "\n").encode())
@ -754,11 +765,12 @@ class Backup(object):
vmproc_task = None vmproc_task = None
if vmproc is not None: if vmproc is not None:
vmproc_task = asyncio.ensure_future(self._cancel_on_error( vmproc_task = asyncio.ensure_future(
self._monitor_process(vmproc, self._monitor_process(vmproc,
'Writing backup to VM {} failed'.format( 'Writing backup to VM {} failed'.format(
self.target_vm.name)), self.target_vm.name)))
send_task)) asyncio.ensure_future(self._cancel_on_error(
vmproc_task, send_task))
for file_name in header_files: for file_name in header_files:
yield from to_send.put(file_name) yield from to_send.put(file_name)
@ -782,10 +794,12 @@ class Backup(object):
except: except:
yield from to_send.put(QUEUE_ERROR) yield from to_send.put(QUEUE_ERROR)
# in fact we may be handling CancelledError, induced by # in fact we may be handling CancelledError, induced by
# exception in send_task (and propagated by # exception in send_task or vmproc_task (and propagated by
# self._cancel_on_error call above); in such a case this # self._cancel_on_error call above); in such a case this
# yield from will raise exception, covering CancelledError - # yield from will raise exception, covering CancelledError -
# this is intended behaviour # this is intended behaviour
if vmproc_task:
yield from vmproc_task
yield from send_task yield from send_task
raise raise

View File

@ -27,6 +27,9 @@ import os
import shutil import shutil
import sys import sys
import asyncio
import qubes import qubes
import qubes.backup import qubes.backup
import qubes.exc import qubes.exc
@ -38,6 +41,14 @@ import qubes.vm.appvm
import qubes.vm.templatevm import qubes.vm.templatevm
import qubes.vm.qubesvm import qubes.vm.qubesvm
try:
import qubesadmin.backup.restore
import qubesadmin.exc
restore_available = True
except ImportError:
restore_available = False
# noinspection PyAttributeOutsideInit # noinspection PyAttributeOutsideInit
class BackupTestsMixin(object): class BackupTestsMixin(object):
class BackupErrorHandler(logging.Handler): class BackupErrorHandler(logging.Handler):
@ -65,15 +76,15 @@ class BackupTestsMixin(object):
self.error_handler = self.BackupErrorHandler(self.error_detected, self.error_handler = self.BackupErrorHandler(self.error_detected,
level=logging.WARNING) level=logging.WARNING)
backup_log = logging.getLogger('qubes.backup') backup_log = logging.getLogger('qubesadmin.backup')
backup_log.addHandler(self.error_handler) backup_log.addHandler(self.error_handler)
def tearDown(self): def tearDown(self):
super(BackupTestsMixin, self).tearDown()
shutil.rmtree(self.backupdir) shutil.rmtree(self.backupdir)
backup_log = logging.getLogger('qubes.backup') backup_log = logging.getLogger('qubes.backup')
backup_log.removeHandler(self.error_handler) backup_log.removeHandler(self.error_handler)
super(BackupTestsMixin, self).tearDown()
def fill_image(self, path, size=None, sparse=False): def fill_image(self, path, size=None, sparse=False):
block_size = 4096 block_size = 4096
@ -112,7 +123,6 @@ class BackupTestsMixin(object):
self.log.debug("Creating %s" % vmname) self.log.debug("Creating %s" % vmname)
testvm1 = self.app.add_new_vm(qubes.vm.appvm.AppVM, testvm1 = self.app.add_new_vm(qubes.vm.appvm.AppVM,
name=vmname, template=template, label='red') name=vmname, template=template, label='red')
testvm1.uses_default_netvm = False
testvm1.netvm = testnet testvm1.netvm = testnet
self.loop.run_until_complete( self.loop.run_until_complete(
testvm1.create_on_disk(pool=pool)) testvm1.create_on_disk(pool=pool))
@ -175,10 +185,18 @@ class BackupTestsMixin(object):
else: else:
raise raise
def remove_vms(self, vms):
vms = list(vms)
for vm in vms:
vm.netvm = None
vm.default_dispvm = None
super(BackupTestsMixin, self).remove_vms(vms)
def restore_backup(self, source=None, appvm=None, options=None, def restore_backup(self, source=None, appvm=None, options=None,
expect_errors=None, manipulate_restore_info=None, expect_errors=None, manipulate_restore_info=None,
passphrase='qubes'): passphrase='qubes'):
self.skipTest('Test not converted to Qubes 4.0') if not restore_available:
self.skipTest('qubesadmin module not available')
if source is None: if source is None:
backupfile = os.path.join(self.backupdir, backupfile = os.path.join(self.backupdir,
@ -186,19 +204,30 @@ class BackupTestsMixin(object):
else: else:
backupfile = source backupfile = source
with self.assertNotRaises(qubes.exc.QubesException): client_app = qubesadmin.Qubes()
restore_op = qubes.backup.BackupRestore( if appvm:
self.app, backupfile, appvm, passphrase) appvm = self.loop.run_until_complete(
self.loop.run_in_executor(None,
client_app.domains.__getitem__, appvm.name))
with self.assertNotRaises(qubesadmin.exc.QubesException):
restore_op = self.loop.run_until_complete(
self.loop.run_in_executor(None,
qubesadmin.backup.restore.BackupRestore,
client_app, backupfile, appvm, passphrase))
if options: if options:
for key, value in options.items(): for key, value in options.items():
setattr(restore_op.options, key, value) setattr(restore_op.options, key, value)
restore_info = restore_op.get_restore_info() restore_info = self.loop.run_until_complete(
self.loop.run_in_executor(None,
restore_op.get_restore_info))
if callable(manipulate_restore_info): if callable(manipulate_restore_info):
restore_info = manipulate_restore_info(restore_info) restore_info = manipulate_restore_info(restore_info)
self.log.debug(restore_op.get_restore_summary(restore_info)) self.log.debug(restore_op.get_restore_summary(restore_info))
with self.assertNotRaises(qubes.exc.QubesException): with self.assertNotRaises(qubesadmin.exc.QubesException):
restore_op.restore_do(restore_info) self.loop.run_until_complete(
self.loop.run_in_executor(None,
restore_op.restore_do, restore_info))
errors = [] errors = []
if expect_errors is None: if expect_errors is None:
@ -230,7 +259,7 @@ class BackupTestsMixin(object):
for name, volume in vm.volumes.items(): for name, volume in vm.volumes.items():
if not volume.rw or not volume.save_on_stop: if not volume.rw or not volume.save_on_stop:
continue continue
vol_path = vm.storage.get_pool(volume).export(volume) vol_path = volume.export()
hasher = hashlib.sha1() hasher = hashlib.sha1()
with open(vol_path, 'rb') as afile: with open(vol_path, 'rb') as afile:
for buf in iter(lambda: afile.read(4096000), b''): for buf in iter(lambda: afile.read(4096000), b''):
@ -238,7 +267,37 @@ class BackupTestsMixin(object):
hashes[vm.name][name] = hasher.hexdigest() hashes[vm.name][name] = hasher.hexdigest()
return hashes return hashes
def assertCorrectlyRestored(self, orig_vms, orig_hashes): def get_vms_info(self, vms):
''' Get VM metadata, for comparing VM later without holding actual
reference to the old object.'''
vms_info = {}
for vm in vms:
vm_info = {
'properties': {},
'default': {},
'devices': {},
}
for prop in ('name', 'kernel',
'memory', 'maxmem', 'kernelopts',
'services', 'vcpus', 'features'
'include_in_backups', 'default_user', 'qrexec_timeout',
'autostart', 'pci_strictreset', 'debug',
'internal', 'netvm', 'template', 'label'):
if not hasattr(vm, prop):
continue
vm_info['properties'][prop] = str(getattr(vm, prop))
vm_info['default'][prop] = vm.property_is_default(prop)
for dev_class in vm.devices.keys():
vm_info['devices'][dev_class] = {}
for dev_ass in vm.devices[dev_class].assignments():
vm_info['devices'][dev_class][str(dev_ass.device)] = \
dev_ass.options
vms_info[vm.name] = vm_info
return vms_info
def assertCorrectlyRestored(self, vms_info, orig_hashes):
''' Verify if restored VMs are identical to those before backup. ''' Verify if restored VMs are identical to those before backup.
:param orig_vms: collection of original QubesVM objects :param orig_vms: collection of original QubesVM objects
@ -246,114 +305,108 @@ class BackupTestsMixin(object):
before backup before backup
:return: :return:
''' '''
for vm in orig_vms: for vm_name in vms_info:
self.assertIn(vm.name, self.app.domains) vm_info = vms_info[vm_name]
restored_vm = self.app.domains[vm.name] self.assertIn(vm_name, self.app.domains)
for prop in ('name', 'kernel', restored_vm = self.app.domains[vm_name]
'memory', 'maxmem', 'kernelopts', for prop in vm_info['properties']:
'services', 'vcpus', 'features'
'include_in_backups', 'default_user', 'qrexec_timeout',
'autostart', 'pci_strictreset', 'debug',
'internal'):
if not hasattr(vm, prop):
continue
self.assertEqual( self.assertEqual(
getattr(vm, prop), getattr(restored_vm, prop), vm_info['properties'][prop],
str(getattr(restored_vm, prop)),
"VM {} - property {} not properly restored".format( "VM {} - property {} not properly restored".format(
vm.name, prop)) vm_name, prop))
for prop in ('netvm', 'template', 'label'): self.assertEqual(
if not hasattr(vm, prop): vm_info['default'][prop],
continue restored_vm.property_is_default(prop),
orig_value = getattr(vm, prop) "VM {} - property {} differs in being default".format(
restored_value = getattr(restored_vm, prop) vm_name, prop))
if orig_value and restored_value: for dev_class in vm_info['devices']:
self.assertEqual(orig_value.name, restored_value.name, for dev in vm_info['devices'][dev_class]:
"VM {} - property {} not properly restored".format( found = False
vm.name, prop)) for restored_dev_ass in restored_vm.devices[
else: dev_class].assignments():
self.assertEqual(orig_value, restored_value, if str(restored_dev_ass.device) == dev:
"VM {} - property {} not properly restored".format( found = True
vm.name, prop)) self.assertEqual(vm_info['devices'][dev_class][dev],
for dev_class in vm.devices.keys(): restored_dev_ass.options,
for dev in vm.devices[dev_class]: 'VM {} - {} device {} options mismatch'.format(
self.assertIn(dev, restored_vm.devices[dev_class], vm_name, dev_class, str(dev)))
"VM {} - {} device not restored".format( self.assertTrue(found,
vm.name, dev_class)) 'VM {} - {} device {} not restored'.format(
vm_name, dev_class, dev))
if orig_hashes: if orig_hashes:
hashes = self.vm_checksum([restored_vm])[restored_vm.name] hashes = self.vm_checksum([restored_vm])[restored_vm.name]
self.assertEqual(orig_hashes[vm.name], hashes, self.assertEqual(orig_hashes[vm_name], hashes,
"VM {} - disk images are not properly restored".format( "VM {} - disk images are not properly restored".format(
vm.name)) vm_name))
class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase): class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase):
def test_000_basic_backup(self): def test_000_basic_backup(self):
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms) orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.make_backup(vms)
self.remove_vms(reversed(vms))
finally:
del vms
self.restore_backup() self.restore_backup()
self.assertCorrectlyRestored(vms, orig_hashes) self.assertCorrectlyRestored(vms_info, orig_hashes)
self.remove_vms(reversed(vms))
def test_001_compressed_backup(self): def test_001_compressed_backup(self):
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms, compressed=True) orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.make_backup(vms, compressed=True)
self.remove_vms(reversed(vms))
finally:
del vms
self.restore_backup() self.restore_backup()
self.assertCorrectlyRestored(vms, orig_hashes) self.assertCorrectlyRestored(vms_info, orig_hashes)
def test_002_encrypted_backup(self):
vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms)
self.make_backup(vms, encrypted=True)
self.remove_vms(reversed(vms))
self.restore_backup()
self.assertCorrectlyRestored(vms, orig_hashes)
def test_003_compressed_encrypted_backup(self):
vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms)
self.make_backup(vms, compressed=True, encrypted=True)
self.remove_vms(reversed(vms))
self.restore_backup()
self.assertCorrectlyRestored(vms, orig_hashes)
def test_004_sparse_multipart(self): def test_004_sparse_multipart(self):
vms = [] vms = []
try:
vmname = self.make_vm_name('testhvm2')
self.log.debug("Creating %s" % vmname)
vmname = self.make_vm_name('testhvm2') self.hvmtemplate = self.app.add_new_vm(
self.log.debug("Creating %s" % vmname) qubes.vm.templatevm.TemplateVM, name=vmname, virt_mode='hvm', label='red')
self.loop.run_until_complete(self.hvmtemplate.create_on_disk())
self.fill_image(
os.path.join(self.hvmtemplate.dir_path, '00file'),
195 * 1024 * 1024 - 4096 * 3)
self.fill_image(self.hvmtemplate.storage.export('private'),
195 * 1024 * 1024 - 4096 * 3)
self.fill_image(self.hvmtemplate.storage.export('root'), 1024 * 1024 * 1024,
sparse=True)
vms.append(self.hvmtemplate)
self.app.save()
orig_hashes = self.vm_checksum(vms)
vms_info = self.get_vms_info(vms)
hvmtemplate = self.app.add_new_vm( self.make_backup(vms)
qubes.vm.templatevm.TemplateVM, name=vmname, virt_mode='hvm', label='red') self.remove_vms(reversed(vms))
hvmtemplate.create_on_disk() self.restore_backup()
self.fill_image( self.assertCorrectlyRestored(vms_info, orig_hashes)
os.path.join(hvmtemplate.dir_path, '00file'), # TODO check vm.backup_timestamp
195 * 1024 * 1024 - 4096 * 3) finally:
self.fill_image(hvmtemplate.storage.export('private'), del vms
195 * 1024 * 1024 - 4096 * 3)
self.fill_image(hvmtemplate.storage.export('root'), 1024 * 1024 * 1024,
sparse=True)
vms.append(hvmtemplate)
self.app.save()
orig_hashes = self.vm_checksum(vms)
self.make_backup(vms)
self.remove_vms(reversed(vms))
self.restore_backup()
self.assertCorrectlyRestored(vms, orig_hashes)
# TODO check vm.backup_timestamp
def test_005_compressed_custom(self): def test_005_compressed_custom(self):
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms, compression_filter="bzip2") orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.restore_backup() self.make_backup(vms, compression_filter="bzip2")
self.assertCorrectlyRestored(vms, orig_hashes) self.remove_vms(reversed(vms))
self.restore_backup()
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
def test_010_selective_restore(self): def test_010_selective_restore(self):
# create backup with internal dependencies (template, netvm etc) # create backup with internal dependencies (template, netvm etc)
@ -368,27 +421,39 @@ class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase):
restore_info.pop(name) restore_info.pop(name)
return restore_info return restore_info
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms, compression_filter="bzip2") orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.restore_backup(manipulate_restore_info=exclude_some) self.make_backup(vms, compression_filter="bzip2")
for vm in vms: self.remove_vms(reversed(vms))
if vm.name == self.make_vm_name('test1'): self.restore_backup(manipulate_restore_info=exclude_some)
# netvm was set to 'test-inst-test-net' - excluded for vm_name in vms_info:
vm.netvm = qubes.property.DEFAULT if vm_name == self.make_vm_name('test1'):
elif vm.name == self.make_vm_name('custom'): # netvm was set to 'test-inst-test-net' - excluded
# template was set to 'test-inst-template' - excluded vms_info[vm_name]['properties']['netvm'] = \
vm.template = self.app.default_template str(self.app.default_netvm)
vms = [vm for vm in vms if vm.name not in exclude] vms_info[vm_name]['default']['netvm'] = True
self.assertCorrectlyRestored(vms, orig_hashes) elif vm_name == self.make_vm_name('custom'):
# template was set to 'test-inst-template' - excluded
vms_info[vm_name]['properties']['template'] = \
str(self.app.default_template)
for excluded in exclude:
vms_info.pop(excluded, None)
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
def test_020_encrypted_backup_non_ascii(self): def test_020_encrypted_backup_non_ascii(self):
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms, encrypted=True, passphrase=u'zażółć gęślą jaźń') orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.restore_backup(passphrase=u'zażółć gęślą jaźń') self.make_backup(vms, passphrase=u'zażółć gęślą jaźń')
self.assertCorrectlyRestored(vms, orig_hashes) self.remove_vms(reversed(vms))
self.restore_backup(passphrase=u'zażółć gęślą jaźń')
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
def test_100_backup_dom0_no_restore(self): def test_100_backup_dom0_no_restore(self):
# do not write it into dom0 home itself... # do not write it into dom0 home itself...
@ -403,19 +468,28 @@ class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase):
:return: :return:
""" """
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms) orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
test_dir = vms[0].dir_path self.make_backup(vms)
os.mkdir(test_dir) test_dir = vms[0].dir_path
with open(os.path.join(test_dir, 'some-file.txt'), 'w') as f: self.remove_vms(reversed(vms))
f.write('test file\n') os.mkdir(test_dir)
self.restore_backup( with open(os.path.join(test_dir, 'some-file.txt'), 'w') as f:
expect_errors=[ f.write('test file\n')
'*** Directory {} already exists! It has been moved'.format( self.restore_backup(expect_errors=[
test_dir) 'Error restoring VM test-inst-test-net, skipping: Got empty '
'response from qubesd. See journalctl in dom0 for details.',
'Error setting test-inst-test1.netvm to test-inst-test-net: '
'\'"No such domain: \\\'test-inst-test-net\\\'"\'',
]) ])
self.assertCorrectlyRestored(vms, orig_hashes) del vms_info['test-inst-test-net']
vms_info['test-inst-test1']['properties']['netvm'] = \
str(self.app.default_netvm)
vms_info['test-inst-test1']['default']['netvm'] = True
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
def test_210_auto_rename(self): def test_210_auto_rename(self):
""" """
@ -423,16 +497,22 @@ class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase):
:return: :return:
""" """
vms = self.create_backup_vms() vms = self.create_backup_vms()
self.make_backup(vms) vms_info = self.get_vms_info(vms)
self.restore_backup(options={ try:
'rename_conflicting': True self.make_backup(vms)
}) self.restore_backup(options={
for vm in vms: 'rename_conflicting': True
with self.assertNotRaises( })
(qubes.exc.QubesVMNotFoundError, KeyError)): for vm_name in vms_info:
restored_vm = self.app.domains[vm.name + '1'] with self.assertNotRaises(
if vm.netvm and not vm.property_is_default('netvm'): (qubes.exc.QubesVMNotFoundError, KeyError)):
self.assertEqual(restored_vm.netvm.name, vm.netvm.name + '1') restored_vm = self.app.domains[vm_name + '1']
if vms_info[vm_name]['properties']['netvm'] and \
not vms_info[vm_name]['default']['netvm']:
self.assertEqual(restored_vm.netvm.name,
vms_info[vm_name]['properties']['netvm'] + '1')
finally:
del vms
def _find_pool(self, volume_group, thin_pool): def _find_pool(self, volume_group, thin_pool):
''' Returns the pool matching the specified ``volume_group`` & ''' Returns the pool matching the specified ``volume_group`` &
@ -456,12 +536,15 @@ class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase):
**qubes.tests.storage_lvm.POOL_CONF) **qubes.tests.storage_lvm.POOL_CONF)
self.created_pool = True self.created_pool = True
vms = self.create_backup_vms(pool=self.pool) vms = self.create_backup_vms(pool=self.pool)
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms) orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.restore_backup() self.make_backup(vms)
self.assertCorrectlyRestored(vms, orig_hashes) self.remove_vms(reversed(vms))
self.remove_vms(reversed(vms)) self.restore_backup()
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
@qubes.tests.storage_lvm.skipUnlessLvmPoolExists @qubes.tests.storage_lvm.skipUnlessLvmPoolExists
def test_301_restore_to_lvm(self): def test_301_restore_to_lvm(self):
@ -473,17 +556,20 @@ class TC_00_Backup(BackupTestsMixin, qubes.tests.SystemTestCase):
**qubes.tests.storage_lvm.POOL_CONF) **qubes.tests.storage_lvm.POOL_CONF)
self.created_pool = True self.created_pool = True
vms = self.create_backup_vms() vms = self.create_backup_vms()
orig_hashes = self.vm_checksum(vms) try:
self.make_backup(vms) orig_hashes = self.vm_checksum(vms)
self.remove_vms(reversed(vms)) vms_info = self.get_vms_info(vms)
self.restore_backup(options={'override_pool': self.pool.name}) self.make_backup(vms)
self.assertCorrectlyRestored(vms, orig_hashes) self.remove_vms(reversed(vms))
for vm in vms: self.restore_backup(options={'override_pool': self.pool.name})
vm = self.app.domains[vm.name] self.assertCorrectlyRestored(vms_info, orig_hashes)
for volume in vm.volumes.values(): for vm_name in vms_info:
if volume.save_on_stop: vm = self.app.domains[vm_name]
self.assertEqual(volume.pool, self.pool.name) for volume in vm.volumes.values():
self.remove_vms(reversed(vms)) if volume.save_on_stop:
self.assertEqual(volume.pool, self.pool.name)
finally:
del vms
class TC_10_BackupVMMixin(BackupTestsMixin): class TC_10_BackupVMMixin(BackupTestsMixin):
@ -499,28 +585,40 @@ class TC_10_BackupVMMixin(BackupTestsMixin):
def test_100_send_to_vm_file_with_spaces(self): def test_100_send_to_vm_file_with_spaces(self):
vms = self.create_backup_vms() vms = self.create_backup_vms()
self.loop.run_until_complete(self.backupvm.start()) orig_hashes = self.vm_checksum(vms)
self.loop.run_until_complete(self.backupvm.run_for_stdio( vms_info = self.get_vms_info(vms)
"mkdir '/var/tmp/backup directory'")) try:
self.make_backup(vms, target_vm=self.backupvm, self.loop.run_until_complete(self.backupvm.start())
compressed=True, encrypted=True, self.loop.run_until_complete(self.backupvm.run_for_stdio(
target='/var/tmp/backup directory') "mkdir '/var/tmp/backup directory'"))
self.remove_vms(reversed(vms)) self.make_backup(vms, target_vm=self.backupvm,
(backup_path, _) = self.loop.run_until_complete( compressed=True,
self.backupvm.run_for_stdio("ls /var/tmp/backup*/qubes-backup*")) target='/var/tmp/backup directory')
backup_path = backup_path.decode().strip() self.remove_vms(reversed(vms))
self.restore_backup(source=backup_path, (backup_path, _) = self.loop.run_until_complete(
appvm=self.backupvm) self.backupvm.run_for_stdio("ls /var/tmp/backup*/qubes-backup*"))
backup_path = backup_path.decode().strip()
self.restore_backup(source=backup_path,
appvm=self.backupvm)
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
def test_110_send_to_vm_command(self): def test_110_send_to_vm_command(self):
vms = self.create_backup_vms() vms = self.create_backup_vms()
self.loop.run_until_complete(self.backupvm.start()) orig_hashes = self.vm_checksum(vms)
self.make_backup(vms, target_vm=self.backupvm, vms_info = self.get_vms_info(vms)
compressed=True, encrypted=True, try:
target='dd of=/var/tmp/backup-test') self.loop.run_until_complete(self.backupvm.start())
self.remove_vms(reversed(vms)) self.make_backup(vms, target_vm=self.backupvm,
self.restore_backup(source='dd if=/var/tmp/backup-test', compressed=True,
appvm=self.backupvm) target='dd of=/var/tmp/backup-test')
self.remove_vms(reversed(vms))
self.restore_backup(source='dd if=/var/tmp/backup-test',
appvm=self.backupvm)
self.assertCorrectlyRestored(vms_info, orig_hashes)
finally:
del vms
def test_110_send_to_vm_no_space(self): def test_110_send_to_vm_no_space(self):
""" """
@ -529,21 +627,24 @@ class TC_10_BackupVMMixin(BackupTestsMixin):
:return: :return:
""" """
vms = self.create_backup_vms() vms = self.create_backup_vms()
self.loop.run_until_complete(self.backupvm.start()) try:
self.loop.run_until_complete(self.backupvm.run_for_stdio( self.loop.run_until_complete(self.backupvm.start())
# Debian 7 has too old losetup to handle loop-control device self.loop.run_until_complete(self.backupvm.run_for_stdio(
"mknod /dev/loop0 b 7 0;" # Debian 7 has too old losetup to handle loop-control device
"truncate -s 50M /home/user/backup.img && " "mknod /dev/loop0 b 7 0;"
"mkfs.ext4 -F /home/user/backup.img && " "truncate -s 50M /home/user/backup.img && "
"mkdir /home/user/backup && " "mkfs.ext4 -F /home/user/backup.img && "
"mount /home/user/backup.img /home/user/backup -o loop &&" "mkdir /home/user/backup && "
"chmod 777 /home/user/backup", "mount /home/user/backup.img /home/user/backup -o loop &&"
user="root")) "chmod 777 /home/user/backup",
with self.assertRaises(qubes.exc.QubesException): user="root"))
self.make_backup(vms, target_vm=self.backupvm, with self.assertRaises(qubes.exc.QubesException):
compressed=False, encrypted=True, self.make_backup(vms, target_vm=self.backupvm,
target='/home/user/backup', compressed=False,
expect_failure=True) target='/home/user/backup',
expect_failure=True)
finally:
del vms
def load_tests(loader, tests, pattern): def load_tests(loader, tests, pattern):
@ -551,7 +652,7 @@ def load_tests(loader, tests, pattern):
tests.addTests(loader.loadTestsFromTestCase( tests.addTests(loader.loadTestsFromTestCase(
type( type(
'TC_10_BackupVM_' + template, 'TC_10_BackupVM_' + template,
(TC_10_BackupVMMixin, qubes.tests.QubesTestCase), (TC_10_BackupVMMixin, qubes.tests.SystemTestCase),
{'template': template}))) {'template': template})))
return tests return tests

File diff suppressed because one or more lines are too long

View File

@ -147,8 +147,11 @@ class TC_20_DispVMMixin(object):
self.assertTrue(dispvm.is_running()) self.assertTrue(dispvm.is_running())
try: try:
window_title = 'user@%s' % (dispvm.name,) window_title = 'user@%s' % (dispvm.name,)
# close xterm on Return, but after short delay, to allow
# xdotool to send also keyup event
p.stdin.write("xterm -e " p.stdin.write("xterm -e "
"\"sh -c 'echo \\\"\033]0;{}\007\\\";read x;'\"\n". "\"sh -c 'echo \\\"\033]0;{}\007\\\";read x;"
"sleep 0.1;'\"\n".
format(window_title).encode()) format(window_title).encode())
self.loop.run_until_complete(p.stdin.drain()) self.loop.run_until_complete(p.stdin.drain())
self.wait_for_window(window_title) self.wait_for_window(window_title)

View File

@ -897,6 +897,7 @@ class QubesVM(qubes.vm.mix.net.NetVMMixin, qubes.vm.BaseVM):
libvirt.VIR_DOMAIN_START_PAUSED) libvirt.VIR_DOMAIN_START_PAUSED)
except Exception as exc: except Exception as exc:
self.log.error('Start failed: %s', str(exc))
# let anyone receiving domain-pre-start know that startup failed # let anyone receiving domain-pre-start know that startup failed
yield from self.fire_event_async('domain-start-failed', yield from self.fire_event_async('domain-start-failed',
reason=str(exc)) reason=str(exc))
@ -928,6 +929,7 @@ class QubesVM(qubes.vm.mix.net.NetVMMixin, qubes.vm.BaseVM):
start_guid=start_guid) start_guid=start_guid)
except Exception as exc: # pylint: disable=bare-except except Exception as exc: # pylint: disable=bare-except
self.log.error('Start failed: %s', str(exc))
if self.is_running() or self.is_paused(): if self.is_running() or self.is_paused():
# This avoids losing the exception if an exception is # This avoids losing the exception if an exception is
# raised in self.force_shutdown(), because the vm is not # raised in self.force_shutdown(), because the vm is not

View File

@ -617,6 +617,11 @@ class Policy(object):
if verify_target_value(system_info, dispvm): if verify_target_value(system_info, dispvm):
targets.add(dispvm) targets.add(dispvm)
# expand other keywords
if '$adminvm' in targets:
targets.remove('$adminvm')
targets.add('dom0')
return targets return targets
def evaluate(self, system_info, source, target): def evaluate(self, system_info, source, target):

View File

@ -685,6 +685,7 @@ class TC_20_Policy(qubes.tests.QubesTestCase):
f.write('$tag:tag1 $type:AppVM allow\n') f.write('$tag:tag1 $type:AppVM allow\n')
f.write('test-no-dvm $dispvm allow\n') f.write('test-no-dvm $dispvm allow\n')
f.write('test-standalone $dispvm allow\n') f.write('test-standalone $dispvm allow\n')
f.write('test-standalone $adminvm allow\n')
policy = qubespolicy.Policy('test.service', tmp_policy_dir) policy = qubespolicy.Policy('test.service', tmp_policy_dir)
self.assertCountEqual(policy.collect_targets_for_ask(system_info, self.assertCountEqual(policy.collect_targets_for_ask(system_info,
'test-vm1'), ['test-vm1', 'test-vm2', 'test-vm3', 'test-vm1'), ['test-vm1', 'test-vm2', 'test-vm3',
@ -698,7 +699,7 @@ class TC_20_Policy(qubes.tests.QubesTestCase):
self.assertCountEqual(policy.collect_targets_for_ask(system_info, self.assertCountEqual(policy.collect_targets_for_ask(system_info,
'test-standalone'), ['test-vm1', 'test-vm2', 'test-vm3', 'test-standalone'), ['test-vm1', 'test-vm2', 'test-vm3',
'default-dvm', 'test-no-dvm', 'test-invalid-dvm', 'default-dvm', 'test-no-dvm', 'test-invalid-dvm',
'$dispvm:default-dvm']) '$dispvm:default-dvm', 'dom0'])
self.assertCountEqual(policy.collect_targets_for_ask(system_info, self.assertCountEqual(policy.collect_targets_for_ask(system_info,
'test-no-dvm'), []) 'test-no-dvm'), [])