ext: BlockDevices extension
Handle block devices exposed by VMs
This commit is contained in:
parent
866d908b6d
commit
9bb5054e50
272
qubes/ext/block.py
Normal file
272
qubes/ext/block.py
Normal file
@ -0,0 +1,272 @@
|
||||
# -*- encoding: utf8 -*-
|
||||
#
|
||||
# The Qubes OS Project, http://www.qubes-os.org
|
||||
#
|
||||
# Copyright (C) 2017 Marek Marczykowski-Górecki
|
||||
# <marmarek@invisiblethingslab.com>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License along
|
||||
# with this program; if not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
''' Qubes block devices extensions '''
|
||||
import re
|
||||
import string
|
||||
import lxml.etree
|
||||
|
||||
import qubes.devices
|
||||
import qubes.ext
|
||||
|
||||
name_re = re.compile(r"^[a-z0-9-]{1,12}$")
|
||||
device_re = re.compile(r"^[a-z0-9/-]{1,64}$")
|
||||
# FIXME: any better idea of desc_re?
|
||||
desc_re = re.compile(r"^.{1,255}$")
|
||||
mode_re = re.compile(r"^[rw]$")
|
||||
|
||||
# all frontends, prefer xvdi
|
||||
# TODO: get this from libvirt driver?
|
||||
AVAILABLE_FRONTENDS = ['xvd'+c for c in
|
||||
string.ascii_lowercase[8:]+string.ascii_lowercase[:8]]
|
||||
|
||||
SYSTEM_DISKS = ('xvda', 'xvdb', 'xvdc', 'xvdd')
|
||||
|
||||
|
||||
class BlockDevice(qubes.devices.DeviceInfo):
|
||||
def __init__(self, backend_domain, ident):
|
||||
super(BlockDevice, self).__init__(backend_domain=backend_domain,
|
||||
ident=ident)
|
||||
self._description = None
|
||||
self._mode = None
|
||||
self._size = None
|
||||
|
||||
@property
|
||||
def description(self):
|
||||
'''Human readable device description'''
|
||||
if self._description is None:
|
||||
if not self.backend_domain.is_running():
|
||||
return self.ident
|
||||
safe_set = {ord(c) for c in
|
||||
string.ascii_letters + string.digits + '()+,-.:=_/ '}
|
||||
untrusted_desc = self.backend_domain.qdb.read(
|
||||
'/qubes-block-devices/{}/desc'.format(self.ident))
|
||||
desc = ''.join((chr(c) if c in safe_set else '_')
|
||||
for c in untrusted_desc)
|
||||
self._description = desc
|
||||
return self._description
|
||||
|
||||
@property
|
||||
def mode(self):
|
||||
'''Device mode, either 'w' for read-write, or 'r' for read-only'''
|
||||
if self._mode is None:
|
||||
if not self.backend_domain.is_running():
|
||||
return 'w'
|
||||
untrusted_mode = self.backend_domain.qdb.read(
|
||||
'/qubes-block-devices/{}/mode'.format(self.ident))
|
||||
if untrusted_mode is None:
|
||||
self._mode = 'w'
|
||||
elif untrusted_mode not in (b'w', b'r'):
|
||||
self.backend_domain.log.warning(
|
||||
'Device {} has invalid mode'.format(self.ident))
|
||||
self._mode = 'w'
|
||||
else:
|
||||
self._mode = untrusted_mode.decode()
|
||||
return self._mode
|
||||
|
||||
@property
|
||||
def size(self):
|
||||
'''Device size in bytes'''
|
||||
if self._size is None:
|
||||
if not self.backend_domain.is_running():
|
||||
return None
|
||||
untrusted_size = self.backend_domain.qdb.read(
|
||||
'/qubes-block-devices/{}/size'.format(self.ident))
|
||||
if untrusted_size is None:
|
||||
self._size = 0
|
||||
elif not untrusted_size.isdigit():
|
||||
self.backend_domain.log.warning(
|
||||
'Device {} has invalid size'.format(self.ident))
|
||||
self._size = 0
|
||||
else:
|
||||
self._size = int(untrusted_size)
|
||||
return self._size
|
||||
|
||||
@property
|
||||
def device_node(self):
|
||||
'''Device node in backend domain'''
|
||||
return '/dev/' + self.ident.replace('_', '/')
|
||||
|
||||
|
||||
class BlockDeviceExtension(qubes.ext.Extension):
|
||||
def device_get(self, vm, ident):
|
||||
# pylint: disable=no-self-use
|
||||
'''Read information about device from QubesDB
|
||||
|
||||
:param vm: backend VM object
|
||||
:param ident: device identifier
|
||||
:returns BlockDevice'''
|
||||
|
||||
untrusted_qubes_device_attrs = vm.qdb.list(
|
||||
'/qubes-block-devices/{}/'.format(ident))
|
||||
if not untrusted_qubes_device_attrs:
|
||||
return None
|
||||
return BlockDevice(vm, ident)
|
||||
|
||||
@qubes.ext.handler('device-list:block')
|
||||
def on_device_list_block(self, vm, event):
|
||||
# pylint: disable=unused-argument,no-self-use
|
||||
|
||||
safe_set = {ord(c) for c in
|
||||
string.ascii_letters + string.digits}
|
||||
if not vm.is_running():
|
||||
return
|
||||
untrusted_qubes_devices = vm.qdb.list('/qubes-block-devices/')
|
||||
untrusted_idents = set(untrusted_path.split(b'/', 3)[2]
|
||||
for untrusted_path in untrusted_qubes_devices)
|
||||
for untrusted_ident in untrusted_idents:
|
||||
if not all(c in safe_set for c in untrusted_ident):
|
||||
msg = ("%s vm's device path name contains unsafe characters. "
|
||||
"Skipping it.")
|
||||
vm.log.warning(msg % vm.name)
|
||||
continue
|
||||
|
||||
ident = untrusted_ident.decode('ascii', errors='strict')
|
||||
|
||||
device_info = self.device_get(vm, ident)
|
||||
if device_info:
|
||||
yield device_info
|
||||
|
||||
@qubes.ext.handler('device-get:block')
|
||||
def on_device_get_block(self, vm, event, ident):
|
||||
# pylint: disable=unused-argument,no-self-use
|
||||
if not vm.is_running():
|
||||
return
|
||||
if not vm.app.vmm.offline_mode:
|
||||
yield self.device_get(vm, ident)
|
||||
|
||||
@qubes.ext.handler('device-list-attached:block')
|
||||
def on_device_list_attached(self, vm, event, **kwargs):
|
||||
# pylint: disable=unused-argument,no-self-use
|
||||
if not vm.is_running():
|
||||
return
|
||||
|
||||
xml_desc = lxml.etree.fromstring(vm.libvirt_domain.XMLDesc())
|
||||
|
||||
for disk in xml_desc.findall('devices/disk'):
|
||||
if disk.get('type') != 'block':
|
||||
continue
|
||||
dev_path_node = disk.find('source')
|
||||
if dev_path_node is None:
|
||||
continue
|
||||
dev_path = dev_path_node.get('dev')
|
||||
|
||||
target_node = disk.find('target')
|
||||
if target_node is not None:
|
||||
frontend_dev = target_node.get('dev')
|
||||
if not frontend_dev:
|
||||
continue
|
||||
if frontend_dev in SYSTEM_DISKS:
|
||||
continue
|
||||
else:
|
||||
continue
|
||||
|
||||
backend_domain_node = disk.find('backenddomain')
|
||||
if backend_domain_node is not None:
|
||||
backend_domain = vm.app.domains[backend_domain_node.get('name')]
|
||||
else:
|
||||
backend_domain = vm.app.domains[0]
|
||||
|
||||
options = {}
|
||||
read_only_node = disk.find('readonly')
|
||||
if read_only_node is not None:
|
||||
options['read-only'] = 'yes'
|
||||
else:
|
||||
options['read-only'] = 'no'
|
||||
options['frontend-dev'] = frontend_dev
|
||||
|
||||
if dev_path.startswith('/dev/'):
|
||||
ident = dev_path[len('/dev/'):]
|
||||
else:
|
||||
ident = dev_path
|
||||
|
||||
ident = ident.replace('/', '_')
|
||||
|
||||
yield (BlockDevice(backend_domain, ident), options)
|
||||
|
||||
def find_unused_frontend(self, vm):
|
||||
# pylint: disable=no-self-use
|
||||
'''Find unused block frontend device node for <target dev=.../>
|
||||
parameter'''
|
||||
assert vm.is_running()
|
||||
|
||||
xml = vm.libvirt_domain.XMLDesc()
|
||||
parsed_xml = lxml.etree.fromstring(xml)
|
||||
used = [target.get('dev', None) for target in
|
||||
parsed_xml.xpath("//domain/devices/disk/target")]
|
||||
for dev in AVAILABLE_FRONTENDS:
|
||||
if dev not in used:
|
||||
return dev
|
||||
return None
|
||||
|
||||
@qubes.ext.handler('device-pre-attach:block')
|
||||
def on_device_pre_attached_block(self, vm, event, device, options):
|
||||
# pylint: disable=unused-argument
|
||||
|
||||
# validate options
|
||||
for option, value in options.items():
|
||||
if option == 'frontend-dev':
|
||||
if not value.startswith('xvd') and not value.startswith('sd'):
|
||||
raise qubes.exc.QubesValueError(
|
||||
'Invalid frontend-dev option value: ' + value)
|
||||
elif option == 'read-only':
|
||||
if value not in ('yes', 'no'):
|
||||
raise qubes.exc.QubesValueError(
|
||||
'read-only option can only have '
|
||||
'\'yes\' or \'no\' value')
|
||||
else:
|
||||
raise qubes.exc.QubesValueError(
|
||||
'Unsupported option {}'.format(option))
|
||||
|
||||
if 'read-only' not in options:
|
||||
options['read-only'] = 'yes' if device.mode == 'r' else 'no'
|
||||
if options.get('read-only', 'no') == 'no' and device.mode == 'r':
|
||||
raise qubes.exc.QubesValueError(
|
||||
'This device can be attached only read-only')
|
||||
|
||||
if not vm.is_running():
|
||||
return
|
||||
|
||||
if not device.backend_domain.is_running():
|
||||
raise qubes.exc.QubesVMNotRunningError(device.backend_domain,
|
||||
'Domain {} needs to be running to attach device from '
|
||||
'it'.format(device.backend_domain.name))
|
||||
|
||||
if 'frontend-dev' not in options:
|
||||
options['frontend-dev'] = self.find_unused_frontend(vm)
|
||||
|
||||
vm.libvirt_domain.attachDevice(
|
||||
vm.app.env.get_template('libvirt/devices/block.xml').render(
|
||||
device=device, vm=vm, options=options))
|
||||
|
||||
@qubes.ext.handler('device-pre-detach:block')
|
||||
def on_device_pre_detached_block(self, vm, event, device):
|
||||
# pylint: disable=unused-argument,no-self-use
|
||||
if not vm.is_running():
|
||||
return
|
||||
|
||||
# need to enumerate attached device to find frontend_dev option (at
|
||||
# least)
|
||||
for attached_device, options in self.on_device_list_attached(vm, event):
|
||||
if attached_device == device:
|
||||
vm.libvirt_domain.detachDevice(
|
||||
vm.app.env.get_template('libvirt/devices/block.xml').render(
|
||||
device=device, vm=vm, options=options))
|
||||
break
|
@ -955,6 +955,7 @@ def load_tests(loader, tests, pattern): # pylint: disable=unused-argument
|
||||
# unit tests
|
||||
'qubes.tests.events',
|
||||
'qubes.tests.devices',
|
||||
'qubes.tests.devices_block',
|
||||
'qubes.tests.firewall',
|
||||
'qubes.tests.init',
|
||||
'qubes.tests.vm.init',
|
||||
|
512
qubes/tests/devices_block.py
Normal file
512
qubes/tests/devices_block.py
Normal file
@ -0,0 +1,512 @@
|
||||
# -*- encoding: utf8 -*-
|
||||
#
|
||||
# The Qubes OS Project, http://www.qubes-os.org
|
||||
#
|
||||
# Copyright (C) 2017 Marek Marczykowski-Górecki
|
||||
# <marmarek@invisiblethingslab.com>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License along
|
||||
# with this program; if not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from unittest import mock
|
||||
|
||||
import jinja2
|
||||
|
||||
import qubes.tests
|
||||
import qubes.ext.block
|
||||
|
||||
|
||||
domain_xml_template = '''
|
||||
<domain type='xen' id='9'>
|
||||
<name>test-vm</name>
|
||||
<uuid>00000000-0000-0000-0000-0000000000ae</uuid>
|
||||
<memory unit='KiB'>4096000</memory>
|
||||
<currentMemory unit='KiB'>409600</currentMemory>
|
||||
<vcpu placement='static'>8</vcpu>
|
||||
<os>
|
||||
<type arch='x86_64' machine='xenpv'>linux</type>
|
||||
<kernel>/var/lib/qubes/vm-kernels/4.4.55-11/vmlinuz</kernel>
|
||||
<initrd>/var/lib/qubes/vm-kernels/4.4.55-11/initramfs</initrd>
|
||||
<cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 dyndbg="file drivers/xen/gntdev.c +p" printk=8</cmdline>
|
||||
</os>
|
||||
<clock offset='utc' adjustment='reset'>
|
||||
<timer name='tsc' mode='native'/>
|
||||
</clock>
|
||||
<on_poweroff>destroy</on_poweroff>
|
||||
<on_reboot>destroy</on_reboot>
|
||||
<on_crash>destroy</on_crash>
|
||||
<devices>
|
||||
<disk type='block' device='disk'>
|
||||
<driver name='phy'/>
|
||||
<source dev='/var/lib/qubes/vm-templates/fedora-25/root.img:/var/lib/qubes/vm-templates/fedora-25/root-cow.img'/>
|
||||
<backingStore/>
|
||||
<script path='block-snapshot'/>
|
||||
<target dev='xvda' bus='xen'/>
|
||||
<readonly/>
|
||||
</disk>
|
||||
<disk type='block' device='disk'>
|
||||
<driver name='phy'/>
|
||||
<source dev='/var/lib/qubes/appvms/test-vm/private.img'/>
|
||||
<backingStore/>
|
||||
<target dev='xvdb' bus='xen'/>
|
||||
</disk>
|
||||
<disk type='block' device='disk'>
|
||||
<driver name='phy'/>
|
||||
<source dev='/var/lib/qubes/appvms/test-vm/volatile.img'/>
|
||||
<backingStore/>
|
||||
<target dev='xvdc' bus='xen'/>
|
||||
</disk>
|
||||
<disk type='block' device='disk'>
|
||||
<driver name='phy'/>
|
||||
<source dev='/var/lib/qubes/vm-kernels/4.4.55-11/modules.img'/>
|
||||
<backingStore/>
|
||||
<target dev='xvdd' bus='xen'/>
|
||||
<readonly/>
|
||||
</disk>
|
||||
{}
|
||||
<interface type='ethernet'>
|
||||
<mac address='00:16:3e:5e:6c:06'/>
|
||||
<ip address='10.137.1.8' family='ipv4'/>
|
||||
<script path='vif-route-qubes'/>
|
||||
<backenddomain name='sys-firewall'/>
|
||||
</interface>
|
||||
<console type='pty' tty='/dev/pts/0'>
|
||||
<source path='/dev/pts/0'/>
|
||||
<target type='xen' port='0'/>
|
||||
</console>
|
||||
</devices>
|
||||
</domain>
|
||||
'''
|
||||
|
||||
|
||||
class TestQubesDB(object):
|
||||
def __init__(self, data):
|
||||
self._data = data
|
||||
|
||||
def read(self, key):
|
||||
if isinstance(key, str):
|
||||
key = key.encode()
|
||||
return self._data.get(key, None)
|
||||
|
||||
def list(self, prefix):
|
||||
if isinstance(prefix, str):
|
||||
prefix = prefix.encode()
|
||||
return [key for key in self._data if key.startswith(prefix)]
|
||||
|
||||
|
||||
class TestApp(object):
|
||||
def __init__(self):
|
||||
#: jinja2 environment for libvirt XML templates
|
||||
self.env = jinja2.Environment(
|
||||
loader=jinja2.FileSystemLoader([
|
||||
'templates',
|
||||
]),
|
||||
undefined=jinja2.StrictUndefined)
|
||||
self.domains = {}
|
||||
|
||||
|
||||
class TestVM(object):
|
||||
def __init__(self, qdb, domain_xml=None, running=True, name='test-vm'):
|
||||
self.name = name
|
||||
self.qdb = TestQubesDB(qdb)
|
||||
self.libvirt_domain = mock.Mock()
|
||||
self.is_running = lambda: running
|
||||
self.log = mock.Mock()
|
||||
self.app = TestApp()
|
||||
if domain_xml:
|
||||
self.libvirt_domain.configure_mock(**{
|
||||
'XMLDesc.return_value': domain_xml
|
||||
})
|
||||
|
||||
def __eq__(self, other):
|
||||
if isinstance(other, TestVM):
|
||||
return self.name == other.name
|
||||
|
||||
|
||||
class TC_00_Block(qubes.tests.QubesTestCase):
|
||||
|
||||
def setUp(self):
|
||||
super().setUp()
|
||||
self.ext = qubes.ext.block.BlockDeviceExtension()
|
||||
|
||||
def test_000_device_get(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
device_info = self.ext.device_get(vm, 'sda')
|
||||
self.assertIsInstance(device_info, qubes.ext.block.BlockDevice)
|
||||
self.assertEqual(device_info.backend_domain, vm)
|
||||
self.assertEqual(device_info.ident, 'sda')
|
||||
self.assertEqual(device_info.description, 'Test device')
|
||||
self.assertEqual(device_info._description, 'Test device')
|
||||
self.assertEqual(device_info.size, 1024000)
|
||||
self.assertEqual(device_info.mode, 'w')
|
||||
self.assertEqual(device_info.frontend_domain, None)
|
||||
self.assertEqual(device_info.device_node, '/dev/sda')
|
||||
|
||||
def test_001_device_get_other_node(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/mapper_dmroot': b'',
|
||||
b'/qubes-block-devices/mapper_dmroot/desc': b'Test device',
|
||||
b'/qubes-block-devices/mapper_dmroot/size': b'1024000',
|
||||
b'/qubes-block-devices/mapper_dmroot/mode': b'w',
|
||||
})
|
||||
device_info = self.ext.device_get(vm, 'mapper_dmroot')
|
||||
self.assertIsInstance(device_info, qubes.ext.block.BlockDevice)
|
||||
self.assertEqual(device_info.backend_domain, vm)
|
||||
self.assertEqual(device_info.ident, 'mapper_dmroot')
|
||||
self.assertEqual(device_info.description, 'Test device')
|
||||
self.assertEqual(device_info._description, 'Test device')
|
||||
self.assertEqual(device_info.size, 1024000)
|
||||
self.assertEqual(device_info.mode, 'w')
|
||||
self.assertEqual(device_info.frontend_domain, None)
|
||||
self.assertEqual(device_info.device_node, '/dev/mapper/dmroot')
|
||||
|
||||
def test_002_device_get_invalid_desc(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device<>za\xc4\x87abc',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
device_info = self.ext.device_get(vm, 'sda')
|
||||
self.assertEqual(device_info.description, 'Test device__za__abc')
|
||||
|
||||
def test_003_device_get_invalid_size(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000abc',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
device_info = self.ext.device_get(vm, 'sda')
|
||||
self.assertEqual(device_info.size, 0)
|
||||
vm.log.warning.assert_called_once_with('Device sda has invalid size')
|
||||
|
||||
def test_004_device_get_invalid_mode(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'abc',
|
||||
})
|
||||
device_info = self.ext.device_get(vm, 'sda')
|
||||
self.assertEqual(device_info.mode, 'w')
|
||||
vm.log.warning.assert_called_once_with('Device sda has invalid mode')
|
||||
|
||||
def test_005_device_get_none(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
device_info = self.ext.device_get(vm, 'sdb')
|
||||
self.assertIsNone(device_info)
|
||||
|
||||
def test_010_devices_list(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
b'/qubes-block-devices/sdb': b'',
|
||||
b'/qubes-block-devices/sdb/desc': b'Test device2',
|
||||
b'/qubes-block-devices/sdb/size': b'2048000',
|
||||
b'/qubes-block-devices/sdb/mode': b'r',
|
||||
})
|
||||
devices = sorted(list(self.ext.on_device_list_block(vm, '')))
|
||||
self.assertEqual(len(devices), 2)
|
||||
self.assertEqual(devices[0].backend_domain, vm)
|
||||
self.assertEqual(devices[0].ident, 'sda')
|
||||
self.assertEqual(devices[0].description, 'Test device')
|
||||
self.assertEqual(devices[0].size, 1024000)
|
||||
self.assertEqual(devices[0].mode, 'w')
|
||||
self.assertEqual(devices[1].backend_domain, vm)
|
||||
self.assertEqual(devices[1].ident, 'sdb')
|
||||
self.assertEqual(devices[1].description, 'Test device2')
|
||||
self.assertEqual(devices[1].size, 2048000)
|
||||
self.assertEqual(devices[1].mode, 'r')
|
||||
|
||||
def test_011_devices_list_empty(self):
|
||||
vm = TestVM({})
|
||||
devices = sorted(list(self.ext.on_device_list_block(vm, '')))
|
||||
self.assertEqual(len(devices), 0)
|
||||
|
||||
def test_012_devices_list_invalid_ident(self):
|
||||
vm = TestVM({
|
||||
b'/qubes-block-devices/invalid ident': b'',
|
||||
b'/qubes-block-devices/invalid+ident': b'',
|
||||
b'/qubes-block-devices/invalid#': b'',
|
||||
})
|
||||
devices = sorted(list(self.ext.on_device_list_block(vm, '')))
|
||||
self.assertEqual(len(devices), 0)
|
||||
msg = 'test-vm vm\'s device path name contains unsafe characters. '\
|
||||
'Skipping it.'
|
||||
self.assertEqual(vm.log.warning.mock_calls, [
|
||||
mock.call(msg),
|
||||
mock.call(msg),
|
||||
mock.call(msg),
|
||||
])
|
||||
|
||||
def test_020_find_unused_frontend(self):
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
frontend = self.ext.find_unused_frontend(vm)
|
||||
self.assertEqual(frontend, 'xvdi')
|
||||
|
||||
def test_022_find_unused_frontend2(self):
|
||||
disk = '''
|
||||
<disk type="block" device="disk">
|
||||
<driver name="phy" />
|
||||
<source dev="/dev/sda" />
|
||||
<target dev="xvdi" />
|
||||
<readonly />
|
||||
<backenddomain name="sys-usb" />
|
||||
</disk>
|
||||
'''
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(disk))
|
||||
frontend = self.ext.find_unused_frontend(vm)
|
||||
self.assertEqual(frontend, 'xvdj')
|
||||
|
||||
def test_030_list_attached_empty(self):
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
devices = sorted(list(self.ext.on_device_list_attached(vm, '')))
|
||||
self.assertEqual(len(devices), 0)
|
||||
|
||||
def test_031_list_attached(self):
|
||||
disk = '''
|
||||
<disk type="block" device="disk">
|
||||
<driver name="phy" />
|
||||
<source dev="/dev/sda" />
|
||||
<target dev="xvdi" />
|
||||
<readonly />
|
||||
<backenddomain name="sys-usb" />
|
||||
</disk>
|
||||
'''
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(disk))
|
||||
vm.app.domains['test-vm'] = vm
|
||||
vm.app.domains['sys-usb'] = TestVM({}, name='sys-usb')
|
||||
devices = sorted(list(self.ext.on_device_list_attached(vm, '')))
|
||||
self.assertEqual(len(devices), 1)
|
||||
dev = devices[0][0]
|
||||
options = devices[0][1]
|
||||
self.assertEqual(dev.backend_domain, vm.app.domains['sys-usb'])
|
||||
self.assertEqual(dev.ident, 'sda')
|
||||
self.assertEqual(options['frontend-dev'], 'xvdi')
|
||||
self.assertEqual(options['read-only'], 'yes')
|
||||
|
||||
def test_032_list_attached_dom0(self):
|
||||
disk = '''
|
||||
<disk type="block" device="disk">
|
||||
<driver name="phy" />
|
||||
<source dev="/dev/sda" />
|
||||
<target dev="xvdi" />
|
||||
</disk>
|
||||
'''
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(disk))
|
||||
vm.app.domains['test-vm'] = vm
|
||||
vm.app.domains['sys-usb'] = TestVM({}, name='sys-usb')
|
||||
vm.app.domains['dom0'] = TestVM({}, name='dom0')
|
||||
vm.app.domains[0] = vm.app.domains['dom0']
|
||||
devices = sorted(list(self.ext.on_device_list_attached(vm, '')))
|
||||
self.assertEqual(len(devices), 1)
|
||||
dev = devices[0][0]
|
||||
options = devices[0][1]
|
||||
self.assertEqual(dev.backend_domain, vm.app.domains['dom0'])
|
||||
self.assertEqual(dev.ident, 'sda')
|
||||
self.assertEqual(options['frontend-dev'], 'xvdi')
|
||||
self.assertEqual(options['read-only'], 'no')
|
||||
|
||||
def test_040_attach(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev, {})
|
||||
device_xml = (
|
||||
'<disk type="block" device="disk">\n'
|
||||
' <driver name="phy" />\n'
|
||||
' <source dev="/dev/sda" />\n'
|
||||
' <target dev="xvdi" />\n'
|
||||
'\n'
|
||||
' <backenddomain name="sys-usb" />\n'
|
||||
'</disk>')
|
||||
vm.libvirt_domain.attachDevice.assert_called_once_with(device_xml)
|
||||
|
||||
def test_041_attach_frontend(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev,
|
||||
{'frontend-dev': 'xvdj'})
|
||||
device_xml = (
|
||||
'<disk type="block" device="disk">\n'
|
||||
' <driver name="phy" />\n'
|
||||
' <source dev="/dev/sda" />\n'
|
||||
' <target dev="xvdj" />\n'
|
||||
'\n'
|
||||
' <backenddomain name="sys-usb" />\n'
|
||||
'</disk>')
|
||||
vm.libvirt_domain.attachDevice.assert_called_once_with(device_xml)
|
||||
|
||||
def test_042_attach_read_only(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev,
|
||||
{'read-only': 'yes'})
|
||||
device_xml = (
|
||||
'<disk type="block" device="disk">\n'
|
||||
' <driver name="phy" />\n'
|
||||
' <source dev="/dev/sda" />\n'
|
||||
' <target dev="xvdi" />\n'
|
||||
' <readonly />\n\n'
|
||||
' <backenddomain name="sys-usb" />\n'
|
||||
'</disk>')
|
||||
vm.libvirt_domain.attachDevice.assert_called_once_with(device_xml)
|
||||
|
||||
def test_043_attach_invalid_option(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
with self.assertRaises(qubes.exc.QubesValueError):
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev,
|
||||
{'no-such-option': '123'})
|
||||
self.assertFalse(vm.libvirt_domain.attachDevice.called)
|
||||
|
||||
def test_044_attach_invalid_option2(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
with self.assertRaises(qubes.exc.QubesValueError):
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev,
|
||||
{'read-only': 'maybe'})
|
||||
self.assertFalse(vm.libvirt_domain.attachDevice.called)
|
||||
|
||||
def test_045_attach_backend_not_running(self):
|
||||
back_vm = TestVM(name='sys-usb', running=False, qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'w',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
with self.assertRaises(qubes.exc.QubesVMNotRunningError):
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev, {})
|
||||
self.assertFalse(vm.libvirt_domain.attachDevice.called)
|
||||
|
||||
def test_046_attach_ro_dev_rw(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'r',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
with self.assertRaises(qubes.exc.QubesValueError):
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev,
|
||||
{'read-only': 'no'})
|
||||
self.assertFalse(vm.libvirt_domain.attachDevice.called)
|
||||
|
||||
def test_047_attach_read_only_auto(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'r',
|
||||
})
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
self.ext.on_device_pre_attached_block(vm, '', dev, {})
|
||||
device_xml = (
|
||||
'<disk type="block" device="disk">\n'
|
||||
' <driver name="phy" />\n'
|
||||
' <source dev="/dev/sda" />\n'
|
||||
' <target dev="xvdi" />\n'
|
||||
' <readonly />\n\n'
|
||||
' <backenddomain name="sys-usb" />\n'
|
||||
'</disk>')
|
||||
vm.libvirt_domain.attachDevice.assert_called_once_with(device_xml)
|
||||
|
||||
def test_050_detach(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'r',
|
||||
})
|
||||
device_xml = (
|
||||
'<disk type="block" device="disk">\n'
|
||||
' <driver name="phy" />\n'
|
||||
' <source dev="/dev/sda" />\n'
|
||||
' <target dev="xvdi" />\n'
|
||||
' <readonly />\n\n'
|
||||
' <backenddomain name="sys-usb" />\n'
|
||||
'</disk>')
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(device_xml))
|
||||
vm.app.domains['test-vm'] = vm
|
||||
vm.app.domains['sys-usb'] = TestVM({}, name='sys-usb')
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
self.ext.on_device_pre_detached_block(vm, '', dev)
|
||||
vm.libvirt_domain.detachDevice.assert_called_once_with(device_xml)
|
||||
|
||||
def test_051_detach_not_attached(self):
|
||||
back_vm = TestVM(name='sys-usb', qdb={
|
||||
b'/qubes-block-devices/sda': b'',
|
||||
b'/qubes-block-devices/sda/desc': b'Test device',
|
||||
b'/qubes-block-devices/sda/size': b'1024000',
|
||||
b'/qubes-block-devices/sda/mode': b'r',
|
||||
})
|
||||
device_xml = (
|
||||
'<disk type="block" device="disk">\n'
|
||||
' <driver name="phy" />\n'
|
||||
' <source dev="/dev/sda" />\n'
|
||||
' <target dev="xvdi" />\n'
|
||||
' <readonly />\n\n'
|
||||
' <backenddomain name="sys-usb" />\n'
|
||||
'</disk>')
|
||||
vm = TestVM({}, domain_xml=domain_xml_template.format(''))
|
||||
vm.app.domains['test-vm'] = vm
|
||||
vm.app.domains['sys-usb'] = TestVM({}, name='sys-usb')
|
||||
dev = qubes.ext.block.BlockDevice(back_vm, 'sda')
|
||||
self.ext.on_device_pre_detached_block(vm, '', dev)
|
||||
self.assertFalse(vm.libvirt_domain.detachDevice.called)
|
@ -285,6 +285,7 @@ fi
|
||||
%dir %{python3_sitelib}/qubes/ext/__pycache__
|
||||
%{python3_sitelib}/qubes/ext/__pycache__/*
|
||||
%{python3_sitelib}/qubes/ext/__init__.py
|
||||
%{python3_sitelib}/qubes/ext/block.py
|
||||
%{python3_sitelib}/qubes/ext/gui.py
|
||||
%{python3_sitelib}/qubes/ext/pci.py
|
||||
%{python3_sitelib}/qubes/ext/qubesmanager.py
|
||||
@ -300,6 +301,7 @@ fi
|
||||
%{python3_sitelib}/qubes/tests/api_admin.py
|
||||
%{python3_sitelib}/qubes/tests/app.py
|
||||
%{python3_sitelib}/qubes/tests/devices.py
|
||||
%{python3_sitelib}/qubes/tests/devices_block.py
|
||||
%{python3_sitelib}/qubes/tests/events.py
|
||||
%{python3_sitelib}/qubes/tests/firewall.py
|
||||
%{python3_sitelib}/qubes/tests/init.py
|
||||
@ -397,6 +399,7 @@ fi
|
||||
%attr(2770,root,qubes) %dir /var/lib/qubes/dvmdata
|
||||
%attr(2770,root,qubes) %dir /var/lib/qubes/vm-kernels
|
||||
/usr/share/qubes/templates/libvirt/xen.xml
|
||||
/usr/share/qubes/templates/libvirt/devices/block.xml
|
||||
/usr/share/qubes/templates/libvirt/devices/pci.xml
|
||||
/usr/share/qubes/templates/libvirt/devices/net.xml
|
||||
/usr/lib/tmpfiles.d/qubes.conf
|
||||
|
2
setup.py
2
setup.py
@ -47,9 +47,11 @@ if __name__ == '__main__':
|
||||
'qubes.ext.gui = qubes.ext.gui:GUI',
|
||||
'qubes.ext.r3compatibility = qubes.ext.r3compatibility:R3Compatibility',
|
||||
'qubes.ext.pci = qubes.ext.pci:PCIDeviceExtension',
|
||||
'qubes.ext.block = qubes.ext.block:BlockDeviceExtension',
|
||||
],
|
||||
'qubes.devices': [
|
||||
'pci = qubes.ext.pci:PCIDevice',
|
||||
'block = qubes.ext.block:BlockDevice',
|
||||
'testclass = qubes.tests.devices:TestDevice',
|
||||
],
|
||||
'qubes.storage': [
|
||||
|
16
templates/libvirt/devices/block.xml
Normal file
16
templates/libvirt/devices/block.xml
Normal file
@ -0,0 +1,16 @@
|
||||
<disk type="block" device="{{ options.get('devtype', 'disk') }}">
|
||||
<driver name="phy" />
|
||||
<source dev="{{ device.device_node }}" />
|
||||
{%- if 'frontend-dev' in options %}
|
||||
<target dev="{{ options.get('frontend-dev') }}" />
|
||||
{%- else %}
|
||||
<target dev="xvd{{dd[i]}}" />
|
||||
{% set i = i + 1 %}
|
||||
{%- endif %}
|
||||
|
||||
{%- if options.get('read-only', 'no') == 'yes' %}
|
||||
<readonly />
|
||||
{%- endif %}
|
||||
|
||||
<backenddomain name="{{ device.backend_domain.name }}" />
|
||||
</disk>
|
@ -102,6 +102,14 @@
|
||||
</disk>
|
||||
{% endfor %}
|
||||
|
||||
{# start external devices from xvdi #}
|
||||
{% set i = 4 %}
|
||||
{% for assignment in vm.devices.block.assignments(True) %}
|
||||
{% set device = assignment.device %}
|
||||
{% set options = assignment.options %}
|
||||
{% include 'libvirt/devices/block.xml' %}
|
||||
{% endfor %}
|
||||
|
||||
{% if vm.netvm %}
|
||||
{% include 'libvirt/devices/net.xml' with context %}
|
||||
{% endif %}
|
||||
|
Loading…
Reference in New Issue
Block a user