Merge branch 'paranoid-restore'
* paranoid-restore: tests: paranoid backup restore Add policy for paranoid mode backup restore Add an extension preventing starting a VM while it's being restored Add support for 'tag-created-vm-with' feature
This commit is contained in:
commit
6d50546bd0
2
Makefile
2
Makefile
@ -174,6 +174,8 @@ endif
|
|||||||
mkdir -p $(DESTDIR)/usr/libexec/qubes
|
mkdir -p $(DESTDIR)/usr/libexec/qubes
|
||||||
install -m 0644 qubes-rpc-policy/90-default.policy \
|
install -m 0644 qubes-rpc-policy/90-default.policy \
|
||||||
$(DESTDIR)/etc/qubes/policy.d/90-default.policy
|
$(DESTDIR)/etc/qubes/policy.d/90-default.policy
|
||||||
|
install -m 0644 qubes-rpc-policy/85-admin-backup-restore.policy \
|
||||||
|
$(DESTDIR)/etc/qubes/policy.d/85-admin-backup-restore.policy
|
||||||
cp qubes-rpc/qubes.FeaturesRequest $(DESTDIR)/etc/qubes-rpc/
|
cp qubes-rpc/qubes.FeaturesRequest $(DESTDIR)/etc/qubes-rpc/
|
||||||
cp qubes-rpc/qubes.GetDate $(DESTDIR)/etc/qubes-rpc/
|
cp qubes-rpc/qubes.GetDate $(DESTDIR)/etc/qubes-rpc/
|
||||||
cp qubes-rpc/qubes.GetRandomizedTime $(DESTDIR)/etc/qubes-rpc/
|
cp qubes-rpc/qubes.GetRandomizedTime $(DESTDIR)/etc/qubes-rpc/
|
||||||
|
26
qubes-rpc-policy/85-admin-backup-restore.policy
Normal file
26
qubes-rpc-policy/85-admin-backup-restore.policy
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
## File format:
|
||||||
|
## service-name|* +argument|* source destination action [options]
|
||||||
|
|
||||||
|
## Allow selected DisposableVM perform "paranoid backup restore"
|
||||||
|
admin.vm.Create.AppVM * @tag:backup-restore-mgmt dom0 allow target=dom0
|
||||||
|
admin.vm.Create.StandaloneVM * @tag:backup-restore-mgmt dom0 allow target=dom0
|
||||||
|
admin.vm.Create.TemplateVM * @tag:backup-restore-mgmt dom0 allow target=dom0
|
||||||
|
admin.vm.List * @tag:backup-restore-mgmt dom0 allow target=dom0
|
||||||
|
## Allow checking some basic info about all the VMs, to propose conflicts resolution
|
||||||
|
admin.vm.List * @tag:backup-restore-mgmt @anyvm allow target=dom0
|
||||||
|
admin.vm.property.Get +provides_network @tag:backup-restore-mgmt @anyvm allow target=dom0
|
||||||
|
admin.vm.property.Get +template_for_dispvms @tag:backup-restore-mgmt @anyvm allow target=dom0
|
||||||
|
|
||||||
|
## Allow it to configure just created qubes
|
||||||
|
admin.vm.feature.Set * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.firewall.Set * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.property.Set * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.tag.Set * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.volume.Import * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.volume.Info * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.volume.List * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
admin.vm.volume.Set.revisions_to_keep * @tag:backup-restore-mgmt @tag:backup-restore-in-progress allow target=dom0
|
||||||
|
|
||||||
|
## And finally, allow it to retrieve the actual backup
|
||||||
|
qubes.RestoreById * @tag:backup-restore-mgmt @tag:backup-restore-storage allow
|
||||||
|
|
@ -142,3 +142,12 @@ class AdminExtension(qubes.ext.Extension):
|
|||||||
if hasattr(self, 'policy_cache'):
|
if hasattr(self, 'policy_cache'):
|
||||||
self.policy_cache.cleanup()
|
self.policy_cache.cleanup()
|
||||||
del self.policy_cache
|
del self.policy_cache
|
||||||
|
|
||||||
|
@qubes.ext.handler('domain-tag-add:created-by-*')
|
||||||
|
def on_tag_add(self, vm, event, tag, **kwargs):
|
||||||
|
'''Add extra tags based on creators 'tag-created-vm-with' feature'''
|
||||||
|
# pylint: disable=unused-argument,no-self-use
|
||||||
|
created_by = vm.app.domains[tag.partition('created-by-')[2]]
|
||||||
|
tag_with = created_by.features.get('tag-created-vm-with', '')
|
||||||
|
for tag_with_single in tag_with.split():
|
||||||
|
vm.tags.add(tag_with_single)
|
||||||
|
39
qubes/ext/backup_restore.py
Normal file
39
qubes/ext/backup_restore.py
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
# -*- encoding: utf8 -*-
|
||||||
|
#
|
||||||
|
# The Qubes OS Project, http://www.qubes-os.org
|
||||||
|
#
|
||||||
|
# Copyright (C) 2019 Marek Marczykowski-Górecki
|
||||||
|
# <marmarek@invisiblethingslab.com>
|
||||||
|
#
|
||||||
|
# This library is free software; you can redistribute it and/or
|
||||||
|
# modify it under the terms of the GNU Lesser General Public
|
||||||
|
# License as published by the Free Software Foundation; either
|
||||||
|
# version 2.1 of the License, or (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This library is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
# Lesser General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU Lesser General Public
|
||||||
|
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
"""
|
||||||
|
Backup restore related functionality. Specifically:
|
||||||
|
- prevent starting a domain currently being restored
|
||||||
|
"""
|
||||||
|
|
||||||
|
import qubes.api
|
||||||
|
import qubes.ext
|
||||||
|
import qubes.vm.adminvm
|
||||||
|
|
||||||
|
|
||||||
|
class BackupRestoreExtension(qubes.ext.Extension):
|
||||||
|
# pylint: disable=too-few-public-methods
|
||||||
|
@qubes.ext.handler('domain-pre-start')
|
||||||
|
def on_domain_pre_start(self, vm, event, **kwargs):
|
||||||
|
"""Prevent starting a VM during restore"""
|
||||||
|
# pylint: disable=unused-argument,no-self-use
|
||||||
|
if 'backup-restore-in-progress' in vm.tags:
|
||||||
|
raise qubes.exc.QubesVMError(
|
||||||
|
vm, 'Restore of this domain in progress, cannot start')
|
@ -1451,6 +1451,7 @@ def load_tests(loader, tests, pattern): # pylint: disable=unused-argument
|
|||||||
'qubes.tests.integ.salt',
|
'qubes.tests.integ.salt',
|
||||||
'qubes.tests.integ.backup',
|
'qubes.tests.integ.backup',
|
||||||
'qubes.tests.integ.backupcompatibility',
|
'qubes.tests.integ.backupcompatibility',
|
||||||
|
'qubes.tests.integ.backupdispvm',
|
||||||
|
|
||||||
# external modules
|
# external modules
|
||||||
'qubes.tests.extra',
|
'qubes.tests.extra',
|
||||||
|
131
qubes/tests/integ/backupdispvm.py
Normal file
131
qubes/tests/integ/backupdispvm.py
Normal file
@ -0,0 +1,131 @@
|
|||||||
|
#
|
||||||
|
# The Qubes OS Project, https://www.qubes-os.org/
|
||||||
|
#
|
||||||
|
# Copyright (C) 2019
|
||||||
|
# Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
|
||||||
|
#
|
||||||
|
# This library is free software; you can redistribute it and/or
|
||||||
|
# modify it under the terms of the GNU Lesser General Public
|
||||||
|
# License as published by the Free Software Foundation; either
|
||||||
|
# version 2.1 of the License, or (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This library is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
# Lesser General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU Lesser General Public
|
||||||
|
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
import hashlib
|
||||||
|
import logging
|
||||||
|
import multiprocessing
|
||||||
|
|
||||||
|
import os
|
||||||
|
import shutil
|
||||||
|
|
||||||
|
import sys
|
||||||
|
|
||||||
|
import asyncio
|
||||||
|
import tempfile
|
||||||
|
|
||||||
|
import unittest.mock
|
||||||
|
|
||||||
|
import qubes
|
||||||
|
import qubes.backup
|
||||||
|
import qubes.storage.lvm
|
||||||
|
import qubes.tests
|
||||||
|
import qubes.tests.integ.backup
|
||||||
|
import qubes.tests.storage_lvm
|
||||||
|
import qubes.vm
|
||||||
|
import qubes.vm.appvm
|
||||||
|
import qubes.vm.templatevm
|
||||||
|
import qubes.vm.qubesvm
|
||||||
|
|
||||||
|
try:
|
||||||
|
import qubesadmin.exc
|
||||||
|
from qubesadmin.backup.dispvm import RestoreInDisposableVM
|
||||||
|
restore_available = True
|
||||||
|
except ImportError:
|
||||||
|
restore_available = False
|
||||||
|
|
||||||
|
|
||||||
|
class TC_00_RestoreInDispVM(qubes.tests.integ.backup.BackupTestsMixin):
|
||||||
|
def setUp(self):
|
||||||
|
if not restore_available:
|
||||||
|
self.skipTest('qubesadmin module not installed')
|
||||||
|
super(TC_00_RestoreInDispVM, self).setUp()
|
||||||
|
self.mgmt_vm = self.app.add_new_vm(
|
||||||
|
qubes.vm.appvm.AppVM,
|
||||||
|
label='red',
|
||||||
|
name=self.make_vm_name('mgmtvm'),
|
||||||
|
template=self.template
|
||||||
|
)
|
||||||
|
self.loop.run_until_complete(self.mgmt_vm.create_on_disk())
|
||||||
|
self.mgmt_vm.template_for_dispvms = True
|
||||||
|
self.app.management_dispvm = self.mgmt_vm
|
||||||
|
self.backupvm = self.app.add_new_vm(
|
||||||
|
qubes.vm.appvm.AppVM,
|
||||||
|
label='red',
|
||||||
|
name=self.make_vm_name('backupvm'),
|
||||||
|
template=self.template
|
||||||
|
)
|
||||||
|
self.loop.run_until_complete(self.backupvm.create_on_disk())
|
||||||
|
|
||||||
|
def restore_backup(self, source=None, appvm=None, options=None,
|
||||||
|
expect_errors=None, manipulate_restore_info=None,
|
||||||
|
passphrase='qubes'):
|
||||||
|
args = unittest.mock.Mock(spec=['app', 'appvm', 'backup_location', 'vms'])
|
||||||
|
args.app = qubesadmin.Qubes()
|
||||||
|
args.appvm = appvm
|
||||||
|
args.backup_location = source
|
||||||
|
# XXX FIXME
|
||||||
|
args.app.blind_mode = True
|
||||||
|
args.vms = []
|
||||||
|
args.auto_close = True
|
||||||
|
with tempfile.NamedTemporaryFile() as pass_file:
|
||||||
|
pass_file.file.write(passphrase.encode())
|
||||||
|
pass_file.file.flush()
|
||||||
|
args.pass_file = pass_file.name
|
||||||
|
restore_in_dispvm = RestoreInDisposableVM(args.app, args)
|
||||||
|
try:
|
||||||
|
backup_log = self.loop.run_until_complete(
|
||||||
|
self.loop.run_in_executor(None, restore_in_dispvm.run))
|
||||||
|
except qubesadmin.exc.BackupRestoreError as e:
|
||||||
|
self.fail(str(e) + ' backup log: ' + e.backup_log.decode())
|
||||||
|
self.app.log.debug(backup_log.decode())
|
||||||
|
|
||||||
|
def test_000_basic_backup(self):
|
||||||
|
self.loop.run_until_complete(self.backupvm.start())
|
||||||
|
self.loop.run_until_complete(self.backupvm.run_for_stdio(
|
||||||
|
"mkdir '/var/tmp/backup directory'"))
|
||||||
|
vms = self.create_backup_vms()
|
||||||
|
try:
|
||||||
|
orig_hashes = self.vm_checksum(vms)
|
||||||
|
vms_info = self.get_vms_info(vms)
|
||||||
|
self.make_backup(vms,
|
||||||
|
target='/var/tmp/backup directory',
|
||||||
|
target_vm=self.backupvm)
|
||||||
|
self.remove_vms(reversed(vms))
|
||||||
|
finally:
|
||||||
|
del vms
|
||||||
|
(backup_path, _) = self.loop.run_until_complete(
|
||||||
|
self.backupvm.run_for_stdio("ls /var/tmp/backup*/qubes-backup*"))
|
||||||
|
backup_path = backup_path.decode().strip()
|
||||||
|
self.restore_backup(source=backup_path,
|
||||||
|
appvm=self.backupvm.name)
|
||||||
|
self.assertCorrectlyRestored(vms_info, orig_hashes)
|
||||||
|
|
||||||
|
|
||||||
|
def create_testcases_for_templates():
|
||||||
|
return qubes.tests.create_testcases_for_templates('TC_10_RestoreInDispVM',
|
||||||
|
TC_00_RestoreInDispVM, qubes.tests.SystemTestCase,
|
||||||
|
module=sys.modules[__name__])
|
||||||
|
|
||||||
|
def load_tests(loader, tests, pattern):
|
||||||
|
tests.addTests(loader.loadTestsFromNames(
|
||||||
|
create_testcases_for_templates()))
|
||||||
|
return tests
|
||||||
|
|
||||||
|
qubes.tests.maybe_create_testcases_on_import(create_testcases_for_templates)
|
@ -416,6 +416,7 @@ done
|
|||||||
%{python3_sitelib}/qubes/ext/__pycache__/*
|
%{python3_sitelib}/qubes/ext/__pycache__/*
|
||||||
%{python3_sitelib}/qubes/ext/__init__.py
|
%{python3_sitelib}/qubes/ext/__init__.py
|
||||||
%{python3_sitelib}/qubes/ext/admin.py
|
%{python3_sitelib}/qubes/ext/admin.py
|
||||||
|
%{python3_sitelib}/qubes/ext/backup_restore.py
|
||||||
%{python3_sitelib}/qubes/ext/block.py
|
%{python3_sitelib}/qubes/ext/block.py
|
||||||
%{python3_sitelib}/qubes/ext/core_features.py
|
%{python3_sitelib}/qubes/ext/core_features.py
|
||||||
%{python3_sitelib}/qubes/ext/gui.py
|
%{python3_sitelib}/qubes/ext/gui.py
|
||||||
@ -478,6 +479,7 @@ done
|
|||||||
%{python3_sitelib}/qubes/tests/integ/__init__.py
|
%{python3_sitelib}/qubes/tests/integ/__init__.py
|
||||||
%{python3_sitelib}/qubes/tests/integ/backup.py
|
%{python3_sitelib}/qubes/tests/integ/backup.py
|
||||||
%{python3_sitelib}/qubes/tests/integ/backupcompatibility.py
|
%{python3_sitelib}/qubes/tests/integ/backupcompatibility.py
|
||||||
|
%{python3_sitelib}/qubes/tests/integ/backupdispvm.py
|
||||||
%{python3_sitelib}/qubes/tests/integ/basic.py
|
%{python3_sitelib}/qubes/tests/integ/basic.py
|
||||||
%{python3_sitelib}/qubes/tests/integ/devices_block.py
|
%{python3_sitelib}/qubes/tests/integ/devices_block.py
|
||||||
%{python3_sitelib}/qubes/tests/integ/devices_pci.py
|
%{python3_sitelib}/qubes/tests/integ/devices_pci.py
|
||||||
@ -529,6 +531,7 @@ done
|
|||||||
/etc/xen/scripts/block-snapshot
|
/etc/xen/scripts/block-snapshot
|
||||||
/etc/xen/scripts/block-origin
|
/etc/xen/scripts/block-origin
|
||||||
/etc/xen/scripts/vif-route-qubes
|
/etc/xen/scripts/vif-route-qubes
|
||||||
|
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/85-admin-backup-restore.policy
|
||||||
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/90-admin-default.policy
|
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/90-admin-default.policy
|
||||||
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/90-default.policy
|
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/90-default.policy
|
||||||
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/include/admin-global-ro
|
%attr(0664,root,qubes) %config(noreplace) /etc/qubes/policy.d/include/admin-global-ro
|
||||||
|
2
setup.py
2
setup.py
@ -61,6 +61,8 @@ if __name__ == '__main__':
|
|||||||
],
|
],
|
||||||
'qubes.ext': [
|
'qubes.ext': [
|
||||||
'qubes.ext.admin = qubes.ext.admin:AdminExtension',
|
'qubes.ext.admin = qubes.ext.admin:AdminExtension',
|
||||||
|
'qubes.ext.backup_restore = '
|
||||||
|
'qubes.ext.backup_restore:BackupRestoreExtension',
|
||||||
'qubes.ext.core_features = qubes.ext.core_features:CoreFeatures',
|
'qubes.ext.core_features = qubes.ext.core_features:CoreFeatures',
|
||||||
'qubes.ext.gui = qubes.ext.gui:GUI',
|
'qubes.ext.gui = qubes.ext.gui:GUI',
|
||||||
'qubes.ext.audio = qubes.ext.audio:AUDIO',
|
'qubes.ext.audio = qubes.ext.audio:AUDIO',
|
||||||
|
Loading…
Reference in New Issue
Block a user