tests: more cases for libvirt xml generation
Related to automatic mem balance enabling/disabling. Check how it behave in presence of PCI devices, or explicit disabling it.
This commit is contained in:
parent
4dc8631010
commit
b8052f864a
@ -849,6 +849,155 @@ class TC_90_QubesVM(QubesVMTestsMixin, qubes.tests.QubesTestCase):
|
|||||||
self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
|
self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
|
||||||
lxml.etree.XML(expected))
|
lxml.etree.XML(expected))
|
||||||
|
|
||||||
|
def test_600_libvirt_xml_pvh_no_membalance(self):
|
||||||
|
expected = '''<domain type="xen">
|
||||||
|
<name>test-inst-test</name>
|
||||||
|
<uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
|
||||||
|
<memory unit="MiB">400</memory>
|
||||||
|
<currentMemory unit="MiB">400</currentMemory>
|
||||||
|
<vcpu placement="static">2</vcpu>
|
||||||
|
<cpu mode='host-passthrough'>
|
||||||
|
<!-- disable nested HVM -->
|
||||||
|
<feature name='vmx' policy='disable'/>
|
||||||
|
<feature name='svm' policy='disable'/>
|
||||||
|
<!-- disable SMAP inside VM, because of Linux bug -->
|
||||||
|
<feature name='smap' policy='disable'/>
|
||||||
|
</cpu>
|
||||||
|
<os>
|
||||||
|
<type arch="x86_64" machine="xenfv">pvh</type>
|
||||||
|
<kernel>/tmp/kernel/vmlinuz</kernel>
|
||||||
|
<initrd>/tmp/kernel/initramfs</initrd>
|
||||||
|
<cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat</cmdline>
|
||||||
|
</os>
|
||||||
|
<features>
|
||||||
|
<pae/>
|
||||||
|
<acpi/>
|
||||||
|
<apic/>
|
||||||
|
<viridian/>
|
||||||
|
</features>
|
||||||
|
<clock offset='utc' adjustment='reset'>
|
||||||
|
<timer name="tsc" mode="native"/>
|
||||||
|
</clock>
|
||||||
|
<on_poweroff>destroy</on_poweroff>
|
||||||
|
<on_reboot>destroy</on_reboot>
|
||||||
|
<on_crash>destroy</on_crash>
|
||||||
|
<devices>
|
||||||
|
<disk type="block" device="disk">
|
||||||
|
<driver name="phy" />
|
||||||
|
<source dev="/tmp/kernel/modules.img" />
|
||||||
|
<target dev="xvdd" />
|
||||||
|
<backenddomain name="dom0" />
|
||||||
|
</disk>
|
||||||
|
<console type="pty">
|
||||||
|
<target type="xen" port="0"/>
|
||||||
|
</console>
|
||||||
|
</devices>
|
||||||
|
</domain>
|
||||||
|
'''
|
||||||
|
my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
|
||||||
|
vm = self.get_vm(uuid=my_uuid)
|
||||||
|
vm.netvm = None
|
||||||
|
vm.virt_mode = 'pvh'
|
||||||
|
vm.maxmem = 0
|
||||||
|
with unittest.mock.patch('qubes.config.qubes_base_dir',
|
||||||
|
'/tmp/qubes-test'):
|
||||||
|
kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
|
||||||
|
os.makedirs(kernel_dir, exist_ok=True)
|
||||||
|
open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
|
||||||
|
open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
|
||||||
|
self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
|
||||||
|
vm.kernel = 'dummy'
|
||||||
|
# tests for storage are later
|
||||||
|
vm.volumes['kernel'] = unittest.mock.Mock(**{
|
||||||
|
'kernels_dir': '/tmp/kernel',
|
||||||
|
'block_device.return_value.domain': 'dom0',
|
||||||
|
'block_device.return_value.script': None,
|
||||||
|
'block_device.return_value.path': '/tmp/kernel/modules.img',
|
||||||
|
'block_device.return_value.devtype': 'disk',
|
||||||
|
'block_device.return_value.name': 'kernel',
|
||||||
|
})
|
||||||
|
libvirt_xml = vm.create_config_file()
|
||||||
|
self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
|
||||||
|
lxml.etree.XML(expected))
|
||||||
|
|
||||||
|
def test_600_libvirt_xml_hvm_pcidev(self):
|
||||||
|
expected = '''<domain type="xen">
|
||||||
|
<name>test-inst-test</name>
|
||||||
|
<uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
|
||||||
|
<memory unit="MiB">400</memory>
|
||||||
|
<currentMemory unit="MiB">400</currentMemory>
|
||||||
|
<vcpu placement="static">2</vcpu>
|
||||||
|
<cpu mode='host-passthrough'>
|
||||||
|
<!-- disable nested HVM -->
|
||||||
|
<feature name='vmx' policy='disable'/>
|
||||||
|
<feature name='svm' policy='disable'/>
|
||||||
|
<!-- disable SMAP inside VM, because of Linux bug -->
|
||||||
|
<feature name='smap' policy='disable'/>
|
||||||
|
</cpu>
|
||||||
|
<os>
|
||||||
|
<type arch="x86_64" machine="xenfv">hvm</type>
|
||||||
|
<!--
|
||||||
|
For the libxl backend libvirt switches between OVMF (UEFI)
|
||||||
|
and SeaBIOS based on the loader type. This has nothing to
|
||||||
|
do with the hvmloader binary.
|
||||||
|
-->
|
||||||
|
<loader type="rom">hvmloader</loader>
|
||||||
|
<boot dev="cdrom" />
|
||||||
|
<boot dev="hd" />
|
||||||
|
</os>
|
||||||
|
<features>
|
||||||
|
<pae/>
|
||||||
|
<acpi/>
|
||||||
|
<apic/>
|
||||||
|
<viridian/>
|
||||||
|
<xen>
|
||||||
|
<e820_host state="on"/>
|
||||||
|
</xen>
|
||||||
|
</features>
|
||||||
|
<clock offset="variable" adjustment="0" basis="localtime" />
|
||||||
|
<on_poweroff>destroy</on_poweroff>
|
||||||
|
<on_reboot>destroy</on_reboot>
|
||||||
|
<on_crash>destroy</on_crash>
|
||||||
|
<devices>
|
||||||
|
<hostdev type="pci" managed="yes">
|
||||||
|
<source>
|
||||||
|
<address
|
||||||
|
bus="0x00"
|
||||||
|
slot="0x00"
|
||||||
|
function="0x0" />
|
||||||
|
</source>
|
||||||
|
</hostdev>
|
||||||
|
<!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
|
||||||
|
<emulator type="stubdom-linux" />
|
||||||
|
<input type="tablet" bus="usb"/>
|
||||||
|
<video>
|
||||||
|
<model type="vga"/>
|
||||||
|
</video>
|
||||||
|
<graphics type="qubes"/>
|
||||||
|
</devices>
|
||||||
|
</domain>
|
||||||
|
'''
|
||||||
|
my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
|
||||||
|
# required for PCI devices listing
|
||||||
|
self.app.vmm.offline_mode = False
|
||||||
|
vm = self.get_vm(uuid=my_uuid)
|
||||||
|
vm.netvm = None
|
||||||
|
vm.virt_mode = 'hvm'
|
||||||
|
vm.kernel = None
|
||||||
|
# even with meminfo-writer enabled, should have memory==maxmem
|
||||||
|
vm.features['service.meminfo-writer'] = True
|
||||||
|
assignment = qubes.devices.DeviceAssignment(
|
||||||
|
vm, # this is violation of API, but for PCI the argument
|
||||||
|
# is unused
|
||||||
|
'00_00.0',
|
||||||
|
bus='pci',
|
||||||
|
persistent=True)
|
||||||
|
vm.devices['pci']._set.add(
|
||||||
|
assignment)
|
||||||
|
libvirt_xml = vm.create_config_file()
|
||||||
|
self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
|
||||||
|
lxml.etree.XML(expected))
|
||||||
|
|
||||||
def test_610_libvirt_xml_network(self):
|
def test_610_libvirt_xml_network(self):
|
||||||
expected = '''<domain type="xen">
|
expected = '''<domain type="xen">
|
||||||
<name>test-inst-test</name>
|
<name>test-inst-test</name>
|
||||||
|
Loading…
Reference in New Issue
Block a user