Merge remote-tracking branch 'origin/pr/326'
* origin/pr/326: ext/admin: workaround for extension's __init__() called multiple times tests: teardown fixes travis: include core-qrexec in tests api/admin: (ext/admin) limit listing VMs based on qrexec policy api/internal: extract get_system_info() function
This commit is contained in:
commit
46f09f897c
@ -11,9 +11,10 @@ install:
|
|||||||
- sudo apt-get -y install python3-gi gir1.2-gtk-3.0
|
- sudo apt-get -y install python3-gi gir1.2-gtk-3.0
|
||||||
- pip install --quiet -r ci/requirements.txt
|
- pip install --quiet -r ci/requirements.txt
|
||||||
- git clone https://github.com/"${TRAVIS_REPO_SLUG%%/*}"/qubes-builder ~/qubes-builder
|
- git clone https://github.com/"${TRAVIS_REPO_SLUG%%/*}"/qubes-builder ~/qubes-builder
|
||||||
|
- git clone https://github.com/"${TRAVIS_REPO_SLUG%%/*}"/qubes-core-qrexec ~/qubes-core-qrexec
|
||||||
script:
|
script:
|
||||||
- PYTHONPATH=test-packages pylint qubes
|
- PYTHONPATH=test-packages:~/qubes-core-qrexec pylint qubes
|
||||||
- ./run-tests
|
- PYTHONPATH=test-packages:~/qubes-core-qrexec ./run-tests
|
||||||
- ~/qubes-builder/scripts/travis-build
|
- ~/qubes-builder/scripts/travis-build
|
||||||
env:
|
env:
|
||||||
- DIST_DOM0=fc31 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
|
- DIST_DOM0=fc31 USE_QUBES_REPO_VERSION=4.1 USE_QUBES_REPO_TESTING=1
|
||||||
|
@ -8,3 +8,4 @@ lxml
|
|||||||
pylint
|
pylint
|
||||||
sphinx
|
sphinx
|
||||||
PyYAML
|
PyYAML
|
||||||
|
pyinotify
|
||||||
|
@ -30,6 +30,23 @@ import qubes.vm.adminvm
|
|||||||
import qubes.vm.dispvm
|
import qubes.vm.dispvm
|
||||||
|
|
||||||
|
|
||||||
|
def get_system_info(app):
|
||||||
|
system_info = {'domains': {
|
||||||
|
domain.name: {
|
||||||
|
'tags': list(domain.tags),
|
||||||
|
'type': domain.__class__.__name__,
|
||||||
|
'template_for_dispvms':
|
||||||
|
getattr(domain, 'template_for_dispvms', False),
|
||||||
|
'default_dispvm': (domain.default_dispvm.name if
|
||||||
|
getattr(domain, 'default_dispvm', None) else None),
|
||||||
|
'icon': str(domain.label.icon),
|
||||||
|
'guivm': (domain.guivm.name if getattr(domain, 'guivm', None)
|
||||||
|
else None),
|
||||||
|
} for domain in app.domains
|
||||||
|
}}
|
||||||
|
return system_info
|
||||||
|
|
||||||
|
|
||||||
class QubesInternalAPI(qubes.api.AbstractQubesAPI):
|
class QubesInternalAPI(qubes.api.AbstractQubesAPI):
|
||||||
''' Communication interface for dom0 components,
|
''' Communication interface for dom0 components,
|
||||||
by design the input here is trusted.'''
|
by design the input here is trusted.'''
|
||||||
@ -42,19 +59,7 @@ class QubesInternalAPI(qubes.api.AbstractQubesAPI):
|
|||||||
self.enforce(self.dest.name == 'dom0')
|
self.enforce(self.dest.name == 'dom0')
|
||||||
self.enforce(not self.arg)
|
self.enforce(not self.arg)
|
||||||
|
|
||||||
system_info = {'domains': {
|
system_info = get_system_info(self.app)
|
||||||
domain.name: {
|
|
||||||
'tags': list(domain.tags),
|
|
||||||
'type': domain.__class__.__name__,
|
|
||||||
'template_for_dispvms':
|
|
||||||
getattr(domain, 'template_for_dispvms', False),
|
|
||||||
'default_dispvm': (domain.default_dispvm.name if
|
|
||||||
getattr(domain, 'default_dispvm', None) else None),
|
|
||||||
'icon': str(domain.label.icon),
|
|
||||||
'guivm': (domain.guivm.name if getattr(domain, 'guivm', None)
|
|
||||||
else None),
|
|
||||||
} for domain in self.app.domains
|
|
||||||
}}
|
|
||||||
|
|
||||||
return json.dumps(system_info)
|
return json.dumps(system_info)
|
||||||
|
|
||||||
|
@ -18,10 +18,31 @@
|
|||||||
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
import qubes.api
|
import qubes.api
|
||||||
|
import qubes.api.internal
|
||||||
import qubes.ext
|
import qubes.ext
|
||||||
import qubes.vm.adminvm
|
import qubes.vm.adminvm
|
||||||
|
from qrexec.policy import utils, parser
|
||||||
|
|
||||||
|
|
||||||
|
class JustEvaluateAskResolution(parser.AskResolution):
|
||||||
|
def execute(self, caller_ident):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
class JustEvaluateAllowResolution(parser.AllowResolution):
|
||||||
|
def execute(self, caller_ident):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
class AdminExtension(qubes.ext.Extension):
|
class AdminExtension(qubes.ext.Extension):
|
||||||
|
def __init__(self):
|
||||||
|
super(AdminExtension, self).__init__()
|
||||||
|
# during tests, __init__() of the extension can be called multiple
|
||||||
|
# times, because there are multiple Qubes() object instances
|
||||||
|
if not hasattr(self, 'policy_cache'):
|
||||||
|
self.policy_cache = utils.PolicyCache(lazy_load=True)
|
||||||
|
self.policy_cache.initialize_watcher()
|
||||||
|
|
||||||
# pylint: disable=too-few-public-methods
|
# pylint: disable=too-few-public-methods
|
||||||
@qubes.ext.handler(
|
@qubes.ext.handler(
|
||||||
'admin-permission:admin.vm.tag.Set',
|
'admin-permission:admin.vm.tag.Set',
|
||||||
@ -36,3 +57,88 @@ class AdminExtension(qubes.ext.Extension):
|
|||||||
__name__, type(self).__name__))
|
__name__, type(self).__name__))
|
||||||
|
|
||||||
# TODO create that tag here (need to figure out how to pass mgmtvm name)
|
# TODO create that tag here (need to figure out how to pass mgmtvm name)
|
||||||
|
|
||||||
|
@qubes.ext.handler('admin-permission:admin.vm.List')
|
||||||
|
def admin_vm_list(self, vm, event, arg, **kwargs):
|
||||||
|
'''When called with target 'dom0' (aka "get full list"), exclude domains
|
||||||
|
that the caller don't have permission to list
|
||||||
|
'''
|
||||||
|
# pylint: disable=unused-argument
|
||||||
|
|
||||||
|
if vm.klass == 'AdminVM':
|
||||||
|
# dom0 can always list everything
|
||||||
|
return None
|
||||||
|
|
||||||
|
policy = self.policy_cache.get_policy()
|
||||||
|
system_info = qubes.api.internal.get_system_info(vm.app)
|
||||||
|
|
||||||
|
def filter_vms(dest_vm):
|
||||||
|
request = parser.Request(
|
||||||
|
'admin.vm.List',
|
||||||
|
'+' + arg,
|
||||||
|
vm.name,
|
||||||
|
dest_vm.name,
|
||||||
|
system_info=system_info,
|
||||||
|
ask_resolution_type=JustEvaluateAskResolution,
|
||||||
|
allow_resolution_type=JustEvaluateAllowResolution)
|
||||||
|
try:
|
||||||
|
resolution = policy.evaluate(request)
|
||||||
|
# do not consider 'ask' as allow here,
|
||||||
|
# this needs to be not interactive
|
||||||
|
return isinstance(resolution, parser.AllowResolution)
|
||||||
|
except parser.AccessDenied:
|
||||||
|
return False
|
||||||
|
|
||||||
|
return (filter_vms,)
|
||||||
|
|
||||||
|
@qubes.ext.handler('admin-permission:admin.Events')
|
||||||
|
def admin_events(self, vm, event, arg, **kwargs):
|
||||||
|
'''When called with target 'dom0' (aka "get all events"),
|
||||||
|
exclude domains that the caller don't have permission to receive
|
||||||
|
events about
|
||||||
|
'''
|
||||||
|
# pylint: disable=unused-argument
|
||||||
|
|
||||||
|
if vm.klass == 'AdminVM':
|
||||||
|
# dom0 can always list everything
|
||||||
|
return None
|
||||||
|
|
||||||
|
def filter_events(event):
|
||||||
|
subject, event, kwargs = event
|
||||||
|
try:
|
||||||
|
dest = subject.name
|
||||||
|
except AttributeError:
|
||||||
|
# domain-add and similar events fired on the Qubes() object
|
||||||
|
if 'vm' in kwargs:
|
||||||
|
dest = kwargs['vm'].name
|
||||||
|
else:
|
||||||
|
dest = '@adminvm'
|
||||||
|
|
||||||
|
policy = self.policy_cache.get_policy()
|
||||||
|
# TODO: cache system_info (based on last qubes.xml write time?)
|
||||||
|
system_info = qubes.api.internal.get_system_info(vm.app)
|
||||||
|
request = parser.Request(
|
||||||
|
'admin.Events',
|
||||||
|
'+' + event.replace(':', '_'),
|
||||||
|
vm.name,
|
||||||
|
dest,
|
||||||
|
system_info=system_info,
|
||||||
|
ask_resolution_type=JustEvaluateAskResolution,
|
||||||
|
allow_resolution_type=JustEvaluateAllowResolution)
|
||||||
|
try:
|
||||||
|
resolution = policy.evaluate(request)
|
||||||
|
# do not consider 'ask' as allow here,
|
||||||
|
# this needs to be not interactive
|
||||||
|
return isinstance(resolution, parser.AllowResolution)
|
||||||
|
except parser.AccessDenied:
|
||||||
|
return False
|
||||||
|
|
||||||
|
return (filter_events,)
|
||||||
|
|
||||||
|
@qubes.ext.handler('qubes-close', system=True)
|
||||||
|
def on_qubes_close(self, app, event, **kwargs):
|
||||||
|
"""Unregister policy file watches on app.close()."""
|
||||||
|
# pylint: disable=unused-argument
|
||||||
|
if hasattr(self, 'policy_cache'):
|
||||||
|
self.policy_cache.cleanup()
|
||||||
|
del self.policy_cache
|
||||||
|
@ -109,8 +109,12 @@ class TC_00_QubesDaemonProtocol(qubes.tests.QubesTestCase):
|
|||||||
connect_coro)
|
connect_coro)
|
||||||
|
|
||||||
def tearDown(self):
|
def tearDown(self):
|
||||||
self.sock_server.close()
|
self.writer.close()
|
||||||
self.sock_client.close()
|
try:
|
||||||
|
self.loop.run_until_complete(self.writer.wait_closed())
|
||||||
|
except AttributeError: # old python in travis
|
||||||
|
pass
|
||||||
|
self.transport.close()
|
||||||
super(TC_00_QubesDaemonProtocol, self).tearDown()
|
super(TC_00_QubesDaemonProtocol, self).tearDown()
|
||||||
|
|
||||||
def test_000_message_ok(self):
|
def test_000_message_ok(self):
|
||||||
|
@ -30,6 +30,8 @@ import unittest.mock
|
|||||||
import libvirt
|
import libvirt
|
||||||
import copy
|
import copy
|
||||||
|
|
||||||
|
import pathlib
|
||||||
|
|
||||||
import qubes
|
import qubes
|
||||||
import qubes.devices
|
import qubes.devices
|
||||||
import qubes.firewall
|
import qubes.firewall
|
||||||
@ -135,6 +137,24 @@ class TC_00_VMs(AdminAPITestCase):
|
|||||||
self.assertEqual(value,
|
self.assertEqual(value,
|
||||||
'test-vm1 class=AppVM state=Halted\n')
|
'test-vm1 class=AppVM state=Halted\n')
|
||||||
|
|
||||||
|
def test_002_vm_list_filter(self):
|
||||||
|
with tempfile.TemporaryDirectory() as tmpdir:
|
||||||
|
tmpdir = pathlib.Path(tmpdir)
|
||||||
|
with unittest.mock.patch(
|
||||||
|
'qubes.ext.admin.AdminExtension._instance.policy_cache.path',
|
||||||
|
pathlib.Path(tmpdir)):
|
||||||
|
with (tmpdir / 'admin.policy').open('w') as f:
|
||||||
|
f.write('admin.vm.List * @anyvm @adminvm allow\n')
|
||||||
|
f.write('admin.vm.List * @anyvm test-vm1 allow')
|
||||||
|
mgmt_obj = qubes.api.admin.QubesAdminAPI(self.app, b'test-vm1',
|
||||||
|
b'admin.vm.List', b'dom0', b'')
|
||||||
|
loop = asyncio.get_event_loop()
|
||||||
|
value = loop.run_until_complete(
|
||||||
|
mgmt_obj.execute(untrusted_payload=b''))
|
||||||
|
self.assertEqual(value,
|
||||||
|
'dom0 class=AdminVM state=Running\n'
|
||||||
|
'test-vm1 class=AppVM state=Halted\n')
|
||||||
|
|
||||||
def test_010_vm_property_list(self):
|
def test_010_vm_property_list(self):
|
||||||
# this test is kind of stupid, but at least check if appropriate
|
# this test is kind of stupid, but at least check if appropriate
|
||||||
# admin-permission event is fired
|
# admin-permission event is fired
|
||||||
@ -1112,6 +1132,45 @@ netvm default=True type=vm \n'''
|
|||||||
unittest.mock.call(vm2, 'test-event2', arg1='abc'),
|
unittest.mock.call(vm2, 'test-event2', arg1='abc'),
|
||||||
])
|
])
|
||||||
|
|
||||||
|
def test_272_events_filter(self):
|
||||||
|
with tempfile.TemporaryDirectory() as tmpdir:
|
||||||
|
tmpdir = pathlib.Path(tmpdir)
|
||||||
|
with unittest.mock.patch(
|
||||||
|
'qubes.ext.admin.AdminExtension._instance.policy_cache.path',
|
||||||
|
pathlib.Path(tmpdir)):
|
||||||
|
with (tmpdir / 'admin.policy').open('w') as f:
|
||||||
|
f.write('admin.Events * @anyvm @adminvm allow\n')
|
||||||
|
f.write('admin.Events * @anyvm test-vm1 allow')
|
||||||
|
|
||||||
|
send_event = unittest.mock.Mock(spec=[])
|
||||||
|
mgmt_obj = qubes.api.admin.QubesAdminAPI(self.app, b'test-vm1',
|
||||||
|
b'admin.Events',
|
||||||
|
b'dom0', b'', send_event=send_event)
|
||||||
|
|
||||||
|
@asyncio.coroutine
|
||||||
|
def fire_event():
|
||||||
|
# add VM _after_ starting admin.Events call
|
||||||
|
vm = self.app.add_new_vm('AppVM', label='red',
|
||||||
|
name='test-vm2',
|
||||||
|
template='test-template')
|
||||||
|
vm.fire_event('test-event2', arg1='abc')
|
||||||
|
self.vm.fire_event('test-event', arg1='abc')
|
||||||
|
mgmt_obj.cancel()
|
||||||
|
return vm
|
||||||
|
|
||||||
|
loop = asyncio.get_event_loop()
|
||||||
|
execute_task = asyncio.ensure_future(
|
||||||
|
mgmt_obj.execute(untrusted_payload=b''))
|
||||||
|
event_task = asyncio.ensure_future(fire_event())
|
||||||
|
loop.run_until_complete(execute_task)
|
||||||
|
vm2 = event_task.result()
|
||||||
|
self.assertIsNone(execute_task.result())
|
||||||
|
self.assertEqual(send_event.mock_calls,
|
||||||
|
[
|
||||||
|
unittest.mock.call(self.app, 'connection-established'),
|
||||||
|
unittest.mock.call(self.vm, 'test-event', arg1='abc'),
|
||||||
|
])
|
||||||
|
|
||||||
def test_280_feature_list(self):
|
def test_280_feature_list(self):
|
||||||
self.vm.features['test-feature'] = 'some-value'
|
self.vm.features['test-feature'] = 'some-value'
|
||||||
value = self.call_mgmt_func(b'admin.vm.feature.List', b'test-vm1')
|
value = self.call_mgmt_func(b'admin.vm.feature.List', b'test-vm1')
|
||||||
|
@ -480,6 +480,9 @@ class TC_89_QubesEmpty(qubes.tests.QubesTestCase):
|
|||||||
with self.assertRaises(AttributeError):
|
with self.assertRaises(AttributeError):
|
||||||
self.app.default_fw_netvm
|
self.app.default_fw_netvm
|
||||||
|
|
||||||
|
self.app.close()
|
||||||
|
del self.app
|
||||||
|
|
||||||
with self.subTest('loop'):
|
with self.subTest('loop'):
|
||||||
with open('/tmp/qubestest.xml', 'w') as xml_file:
|
with open('/tmp/qubestest.xml', 'w') as xml_file:
|
||||||
xml_file.write(xml_template.format(
|
xml_file.write(xml_template.format(
|
||||||
@ -502,6 +505,9 @@ class TC_89_QubesEmpty(qubes.tests.QubesTestCase):
|
|||||||
with self.assertRaises(AttributeError):
|
with self.assertRaises(AttributeError):
|
||||||
self.app.default_fw_netvm
|
self.app.default_fw_netvm
|
||||||
|
|
||||||
|
self.app.close()
|
||||||
|
del self.app
|
||||||
|
|
||||||
|
|
||||||
class TC_90_Qubes(qubes.tests.QubesTestCase):
|
class TC_90_Qubes(qubes.tests.QubesTestCase):
|
||||||
def tearDown(self):
|
def tearDown(self):
|
||||||
|
@ -131,6 +131,7 @@ class TC_00_ThinPool(ThinPoolBase):
|
|||||||
def tearDown(self):
|
def tearDown(self):
|
||||||
super(TC_00_ThinPool, self).tearDown()
|
super(TC_00_ThinPool, self).tearDown()
|
||||||
os.unlink(self.app.store)
|
os.unlink(self.app.store)
|
||||||
|
self.app.close()
|
||||||
del self.app
|
del self.app
|
||||||
for attr in dir(self):
|
for attr in dir(self):
|
||||||
if isinstance(getattr(self, attr), qubes.vm.BaseVM):
|
if isinstance(getattr(self, attr), qubes.vm.BaseVM):
|
||||||
@ -1141,6 +1142,7 @@ class TC_02_StorageHelpers(ThinPoolBase):
|
|||||||
self.thin_dir.cleanup()
|
self.thin_dir.cleanup()
|
||||||
super(TC_02_StorageHelpers, self).tearDown()
|
super(TC_02_StorageHelpers, self).tearDown()
|
||||||
os.unlink(self.app.store)
|
os.unlink(self.app.store)
|
||||||
|
self.app.close()
|
||||||
del self.app
|
del self.app
|
||||||
for attr in dir(self):
|
for attr in dir(self):
|
||||||
if isinstance(getattr(self, attr), qubes.vm.BaseVM):
|
if isinstance(getattr(self, attr), qubes.vm.BaseVM):
|
||||||
|
Loading…
Reference in New Issue
Block a user