basic.py 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634
  1. #!/usr/bin/python
  2. # vim: fileencoding=utf-8
  3. #
  4. # The Qubes OS Project, https://www.qubes-os.org/
  5. #
  6. # Copyright (C) 2014-2015
  7. # Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  8. # Copyright (C) 2015 Wojtek Porczyk <woju@invisiblethingslab.com>
  9. #
  10. # This program is free software; you can redistribute it and/or modify
  11. # it under the terms of the GNU General Public License as published by
  12. # the Free Software Foundation; either version 2 of the License, or
  13. # (at your option) any later version.
  14. #
  15. # This program is distributed in the hope that it will be useful,
  16. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. # GNU General Public License for more details.
  19. #
  20. # You should have received a copy of the GNU General Public License along
  21. # with this program; if not, write to the Free Software Foundation, Inc.,
  22. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  23. #
  24. import multiprocessing
  25. import os
  26. import shutil
  27. import subprocess
  28. import unittest
  29. import time
  30. from qubes.qubes import QubesVmCollection, QubesException, system_path
  31. import qubes.qubes
  32. import qubes.tests
  33. from qubes.qubes import QubesVmLabels
  34. class TC_00_Basic(qubes.tests.SystemTestsMixin, qubes.tests.QubesTestCase):
  35. def test_000_create(self):
  36. vmname = self.make_vm_name('appvm')
  37. vm = self.qc.add_new_vm('QubesAppVm',
  38. name=vmname, template=self.qc.get_default_template())
  39. self.assertIsNotNone(vm)
  40. self.assertEqual(vm.name, vmname)
  41. self.assertEqual(vm.template, self.qc.get_default_template())
  42. vm.create_on_disk(verbose=False)
  43. with self.assertNotRaises(qubes.qubes.QubesException):
  44. vm.verify_files()
  45. class TC_01_Properties(qubes.tests.SystemTestsMixin, qubes.tests.QubesTestCase):
  46. def setUp(self):
  47. super(TC_01_Properties, self).setUp()
  48. self.vmname = self.make_vm_name('appvm')
  49. self.vm = self.qc.add_new_vm('QubesAppVm',
  50. name=self.vmname, template=self.qc.get_default_template())
  51. self.vm.create_on_disk(verbose=False)
  52. def save_and_reload_db(self):
  53. super(TC_01_Properties, self).save_and_reload_db()
  54. if hasattr(self, 'vm'):
  55. self.vm = self.qc.get(self.vm.qid, None)
  56. if hasattr(self, 'netvm'):
  57. self.netvm = self.qc.get(self.netvm.qid, None)
  58. def test_000_rename(self):
  59. newname = self.make_vm_name('newname')
  60. self.assertEqual(self.vm.name, self.vmname)
  61. self.vm.write_firewall_conf({'allow': False, 'allowDns': False})
  62. self.vm.autostart = True
  63. self.addCleanup(os.system,
  64. 'sudo systemctl -q disable qubes-vm@{}.service || :'.
  65. format(self.vmname))
  66. pre_rename_firewall = self.vm.get_firewall_conf()
  67. #TODO: change to setting property when implemented
  68. self.vm.set_name(newname)
  69. self.assertEqual(self.vm.name, newname)
  70. self.assertEqual(self.vm.dir_path,
  71. os.path.join(system_path['qubes_appvms_dir'], newname))
  72. self.assertEqual(self.vm.conf_file,
  73. os.path.join(self.vm.dir_path, newname + '.conf'))
  74. self.assertTrue(os.path.exists(
  75. os.path.join(self.vm.dir_path, "apps", newname + "-vm.directory")))
  76. # FIXME: set whitelisted-appmenus.list first
  77. self.assertTrue(os.path.exists(
  78. os.path.join(self.vm.dir_path, "apps", newname + "-firefox.desktop")))
  79. self.assertTrue(os.path.exists(
  80. os.path.join(os.getenv("HOME"), ".local/share/desktop-directories",
  81. newname + "-vm.directory")))
  82. self.assertTrue(os.path.exists(
  83. os.path.join(os.getenv("HOME"), ".local/share/applications",
  84. newname + "-firefox.desktop")))
  85. self.assertFalse(os.path.exists(
  86. os.path.join(os.getenv("HOME"), ".local/share/desktop-directories",
  87. self.vmname + "-vm.directory")))
  88. self.assertFalse(os.path.exists(
  89. os.path.join(os.getenv("HOME"), ".local/share/applications",
  90. self.vmname + "-firefox.desktop")))
  91. self.assertEquals(pre_rename_firewall, self.vm.get_firewall_conf())
  92. with self.assertNotRaises((QubesException, OSError)):
  93. self.vm.write_firewall_conf({'allow': False})
  94. self.assertTrue(self.vm.autostart)
  95. self.assertTrue(os.path.exists(
  96. '/etc/systemd/system/multi-user.target.wants/'
  97. 'qubes-vm@{}.service'.format(newname)))
  98. self.assertFalse(os.path.exists(
  99. '/etc/systemd/system/multi-user.target.wants/'
  100. 'qubes-vm@{}.service'.format(self.vmname)))
  101. def test_010_netvm(self):
  102. if self.qc.get_default_netvm() is None:
  103. self.skip("Set default NetVM before running this test")
  104. self.netvm = self.qc.add_new_vm("QubesNetVm",
  105. name=self.make_vm_name('netvm'),
  106. template=self.qc.get_default_template())
  107. self.netvm.create_on_disk(verbose=False)
  108. # TODO: remove this line after switching to core3
  109. self.save_and_reload_db()
  110. self.assertEquals(self.vm.netvm, self.qc.get_default_netvm())
  111. self.vm.uses_default_netvm = False
  112. self.vm.netvm = None
  113. self.assertIsNone(self.vm.netvm)
  114. self.save_and_reload_db()
  115. self.assertIsNone(self.vm.netvm)
  116. self.vm.netvm = self.qc[self.netvm.qid]
  117. self.assertEquals(self.vm.netvm.qid, self.netvm.qid)
  118. self.save_and_reload_db()
  119. self.assertEquals(self.vm.netvm.qid, self.netvm.qid)
  120. self.vm.uses_default_netvm = True
  121. # TODO: uncomment when properly implemented
  122. # self.assertEquals(self.vm.netvm.qid, self.qc.get_default_netvm().qid)
  123. self.save_and_reload_db()
  124. self.assertEquals(self.vm.netvm.qid, self.qc.get_default_netvm().qid)
  125. with self.assertRaises(ValueError):
  126. self.vm.netvm = self.vm
  127. def test_020_dispvm_netvm(self):
  128. if self.qc.get_default_netvm() is None:
  129. self.skip("Set default NetVM before running this test")
  130. self.netvm = self.qc.add_new_vm("QubesNetVm",
  131. name=self.make_vm_name('netvm'),
  132. template=self.qc.get_default_template())
  133. self.netvm.create_on_disk(verbose=False)
  134. self.assertEquals(self.vm.netvm, self.vm.dispvm_netvm)
  135. self.vm.uses_default_dispvm_netvm = False
  136. self.vm.dispvm_netvm = None
  137. self.assertIsNone(self.vm.dispvm_netvm)
  138. self.save_and_reload_db()
  139. self.assertIsNone(self.vm.dispvm_netvm)
  140. self.vm.dispvm_netvm = self.netvm
  141. self.assertEquals(self.vm.dispvm_netvm, self.netvm)
  142. self.save_and_reload_db()
  143. self.assertEquals(self.vm.dispvm_netvm, self.netvm)
  144. self.vm.uses_default_dispvm_netvm = True
  145. self.assertEquals(self.vm.dispvm_netvm, self.vm.netvm)
  146. self.save_and_reload_db()
  147. self.assertEquals(self.vm.dispvm_netvm, self.vm.netvm)
  148. with self.assertRaises(ValueError):
  149. self.vm.dispvm_netvm = self.vm
  150. def test_030_clone(self):
  151. testvm1 = self.qc.add_new_vm(
  152. "QubesAppVm",
  153. name=self.make_vm_name("vm"),
  154. template=self.qc.get_default_template())
  155. testvm1.create_on_disk(verbose=False)
  156. testvm2 = self.qc.add_new_vm(testvm1.__class__.__name__,
  157. name=self.make_vm_name("clone"),
  158. template=testvm1.template,
  159. )
  160. testvm2.clone_attrs(src_vm=testvm1)
  161. testvm2.clone_disk_files(src_vm=testvm1, verbose=False)
  162. # qubes.xml reload
  163. self.save_and_reload_db()
  164. testvm1 = self.qc[testvm1.qid]
  165. testvm2 = self.qc[testvm2.qid]
  166. self.assertEquals(testvm1.label, testvm2.label)
  167. self.assertEquals(testvm1.netvm, testvm2.netvm)
  168. self.assertEquals(testvm1.uses_default_netvm,
  169. testvm2.uses_default_netvm)
  170. self.assertEquals(testvm1.kernel, testvm2.kernel)
  171. self.assertEquals(testvm1.kernelopts, testvm2.kernelopts)
  172. self.assertEquals(testvm1.uses_default_kernel,
  173. testvm2.uses_default_kernel)
  174. self.assertEquals(testvm1.uses_default_kernelopts,
  175. testvm2.uses_default_kernelopts)
  176. self.assertEquals(testvm1.memory, testvm2.memory)
  177. self.assertEquals(testvm1.maxmem, testvm2.maxmem)
  178. self.assertEquals(testvm1.pcidevs, testvm2.pcidevs)
  179. self.assertEquals(testvm1.include_in_backups,
  180. testvm2.include_in_backups)
  181. self.assertEquals(testvm1.default_user, testvm2.default_user)
  182. self.assertEquals(testvm1.services, testvm2.services)
  183. self.assertEquals(testvm1.get_firewall_conf(),
  184. testvm2.get_firewall_conf())
  185. # now some non-default values
  186. testvm1.netvm = None
  187. testvm1.uses_default_netvm = False
  188. testvm1.label = QubesVmLabels['orange']
  189. testvm1.memory = 512
  190. firewall = testvm1.get_firewall_conf()
  191. firewall['allowDns'] = False
  192. firewall['allowYumProxy'] = False
  193. firewall['rules'] = [{'address': '1.2.3.4',
  194. 'netmask': 24,
  195. 'proto': 'tcp',
  196. 'portBegin': 22,
  197. 'portEnd': 22,
  198. }]
  199. testvm1.write_firewall_conf(firewall)
  200. testvm3 = self.qc.add_new_vm(testvm1.__class__.__name__,
  201. name=self.make_vm_name("clone2"),
  202. template=testvm1.template,
  203. )
  204. testvm3.clone_attrs(src_vm=testvm1)
  205. testvm3.clone_disk_files(src_vm=testvm1, verbose=False)
  206. # qubes.xml reload
  207. self.save_and_reload_db()
  208. testvm1 = self.qc[testvm1.qid]
  209. testvm3 = self.qc[testvm3.qid]
  210. self.assertEquals(testvm1.label, testvm3.label)
  211. self.assertEquals(testvm1.netvm, testvm3.netvm)
  212. self.assertEquals(testvm1.uses_default_netvm,
  213. testvm3.uses_default_netvm)
  214. self.assertEquals(testvm1.kernel, testvm3.kernel)
  215. self.assertEquals(testvm1.kernelopts, testvm3.kernelopts)
  216. self.assertEquals(testvm1.uses_default_kernel,
  217. testvm3.uses_default_kernel)
  218. self.assertEquals(testvm1.uses_default_kernelopts,
  219. testvm3.uses_default_kernelopts)
  220. self.assertEquals(testvm1.memory, testvm3.memory)
  221. self.assertEquals(testvm1.maxmem, testvm3.maxmem)
  222. self.assertEquals(testvm1.pcidevs, testvm3.pcidevs)
  223. self.assertEquals(testvm1.include_in_backups,
  224. testvm3.include_in_backups)
  225. self.assertEquals(testvm1.default_user, testvm3.default_user)
  226. self.assertEquals(testvm1.services, testvm3.services)
  227. self.assertEquals(testvm1.get_firewall_conf(),
  228. testvm3.get_firewall_conf())
  229. class TC_02_QvmPrefs(qubes.tests.SystemTestsMixin, qubes.tests.QubesTestCase):
  230. def setup_appvm(self):
  231. self.testvm = self.qc.add_new_vm(
  232. "QubesAppVm",
  233. name=self.make_vm_name("vm"),
  234. template=self.qc.get_default_template())
  235. self.testvm.create_on_disk(verbose=False)
  236. self.save_and_reload_db()
  237. self.qc.unlock_db()
  238. def setup_hvm(self):
  239. self.testvm = self.qc.add_new_vm(
  240. "QubesHVm",
  241. name=self.make_vm_name("hvm"))
  242. self.testvm.create_on_disk(verbose=False)
  243. self.save_and_reload_db()
  244. self.qc.unlock_db()
  245. def pref_set(self, name, value, valid=True):
  246. p = subprocess.Popen(
  247. ['qvm-prefs', '-s', '--', self.testvm.name, name, value],
  248. stdout=subprocess.PIPE,
  249. stderr=subprocess.PIPE,
  250. )
  251. (stdout, stderr) = p.communicate()
  252. if valid:
  253. self.assertEquals(p.returncode, 0,
  254. "qvm-prefs -s .. '{}' '{}' failed: {}{}".format(
  255. name, value, stdout, stderr
  256. ))
  257. else:
  258. self.assertNotEquals(p.returncode, 0,
  259. "qvm-prefs should reject value '{}' for "
  260. "property '{}'".format(value, name))
  261. def pref_get(self, name):
  262. p = subprocess.Popen(['qvm-prefs', '-g', self.testvm.name, name],
  263. stdout=subprocess.PIPE)
  264. (stdout, _) = p.communicate()
  265. self.assertEquals(p.returncode, 0)
  266. return stdout.strip()
  267. bool_test_values = [
  268. ('true', 'True', True),
  269. ('False', 'False', True),
  270. ('0', 'False', True),
  271. ('1', 'True', True),
  272. ('invalid', '', False)
  273. ]
  274. def execute_tests(self, name, values):
  275. """
  276. Helper function, which executes tests for given property.
  277. :param values: list of tuples (value, expected, valid),
  278. where 'value' is what should be set and 'expected' is what should
  279. qvm-prefs returns as a property value and 'valid' marks valid and
  280. invalid values - if it's False, qvm-prefs should reject the value
  281. :return: None
  282. """
  283. for (value, expected, valid) in values:
  284. self.pref_set(name, value, valid)
  285. if valid:
  286. self.assertEquals(self.pref_get(name), expected)
  287. def test_000_kernel(self):
  288. self.setup_appvm()
  289. default_kernel = self.qc.get_default_kernel()
  290. self.execute_tests('kernel', [
  291. ('default', default_kernel, True),
  292. (default_kernel, default_kernel, True),
  293. ('invalid', '', False),
  294. ])
  295. def test_001_include_in_backups(self):
  296. self.setup_appvm()
  297. self.execute_tests('include_in_backups', self.bool_test_values)
  298. def test_002_qrexec_timeout(self):
  299. self.setup_appvm()
  300. self.execute_tests('qrexec_timeout', [
  301. ('60', '60', True),
  302. ('0', '0', True),
  303. ('-10', '', False),
  304. ('invalid', '', False)
  305. ])
  306. def test_003_internal(self):
  307. self.setup_appvm()
  308. self.execute_tests('include_in_backups', self.bool_test_values)
  309. def test_004_label(self):
  310. self.setup_appvm()
  311. self.execute_tests('label', [
  312. ('red', 'red', True),
  313. ('blue', 'blue', True),
  314. ('amber', '', False),
  315. ])
  316. def test_005_kernelopts(self):
  317. self.setup_appvm()
  318. self.execute_tests('kernelopts', [
  319. ('option', 'option', True),
  320. ('default', 'nopat', True),
  321. ('', '', True),
  322. ])
  323. def test_006_template(self):
  324. templates = [tpl for tpl in self.qc.values() if tpl.is_template()]
  325. if not templates:
  326. self.skip("No templates installed")
  327. some_template = templates[0].name
  328. self.setup_appvm()
  329. self.execute_tests('template', [
  330. (some_template, some_template, True),
  331. ('invalid', '', False),
  332. ])
  333. def test_007_memory(self):
  334. self.setup_appvm()
  335. qh = qubes.qubes.QubesHost()
  336. memory_total = qh.memory_total
  337. self.execute_tests('memory', [
  338. ('300', '300', True),
  339. ('1500', '1500', True),
  340. # TODO:
  341. #('500M', '500', True),
  342. #(str(self.testvm.maxmem+500), '', False),
  343. (str(2*memory_total), '', False),
  344. ])
  345. def test_008_maxmem(self):
  346. self.setup_appvm()
  347. qh = qubes.qubes.QubesHost()
  348. memory_total = qh.memory_total
  349. self.execute_tests('memory', [
  350. ('300', '300', True),
  351. ('1500', '1500', True),
  352. # TODO:
  353. #('500M', '500', True),
  354. #(str(self.testvm.memory-50), '', False),
  355. (str(2*memory_total), '', False),
  356. ])
  357. def test_009_autostart(self):
  358. self.setup_appvm()
  359. self.execute_tests('autostart', self.bool_test_values)
  360. def test_010_pci_strictreset(self):
  361. self.setup_appvm()
  362. self.execute_tests('pci_strictreset', self.bool_test_values)
  363. def test_011_dispvm_netvm(self):
  364. self.setup_appvm()
  365. default_netvm = self.qc.get_default_netvm().name
  366. netvms = [tpl for tpl in self.qc.values() if tpl.is_netvm()]
  367. if not netvms:
  368. self.skip("No netvms installed")
  369. some_netvm = netvms[0].name
  370. if some_netvm == default_netvm:
  371. if len(netvms) <= 1:
  372. self.skip("At least two NetVM/ProxyVM required")
  373. some_netvm = netvms[1].name
  374. self.execute_tests('dispvm_netvm', [
  375. (some_netvm, some_netvm, True),
  376. (default_netvm, default_netvm, True),
  377. ('default', default_netvm, True),
  378. ('none', '', True),
  379. (self.testvm.name, '', False),
  380. ('invalid', '', False)
  381. ])
  382. def test_012_mac(self):
  383. self.setup_appvm()
  384. default_mac = self.testvm.mac
  385. self.execute_tests('mac', [
  386. ('00:11:22:33:44:55', '00:11:22:33:44:55', True),
  387. ('auto', default_mac, True),
  388. # TODO:
  389. #('00:11:22:33:44:55:66', '', False),
  390. ('invalid', '', False),
  391. ])
  392. def test_013_default_user(self):
  393. self.setup_appvm()
  394. self.execute_tests('default_user', [
  395. ('someuser', self.testvm.template.default_user, True)
  396. # TODO: tests for standalone VMs
  397. ])
  398. def test_014_pcidevs(self):
  399. self.setup_appvm()
  400. self.execute_tests('pcidevs', [
  401. ('[]', '[]', True),
  402. ('[ "00:00.0" ]', "['00:00.0']", True),
  403. ('invalid', '', False),
  404. ('[invalid]', '', False),
  405. # TODO:
  406. #('["12:12.0"]', '', False)
  407. ])
  408. def test_015_name(self):
  409. self.setup_appvm()
  410. self.execute_tests('name', [
  411. ('invalid!@#name', '', False),
  412. # TODO: duplicate name test - would fail for now...
  413. ])
  414. newname = self.make_vm_name('newname')
  415. self.pref_set('name', newname, True)
  416. self.qc.lock_db_for_reading()
  417. self.qc.load()
  418. self.qc.unlock_db()
  419. self.testvm = self.qc.get_vm_by_name(newname)
  420. self.assertEquals(self.pref_get('name'), newname)
  421. def test_016_vcpus(self):
  422. self.setup_appvm()
  423. self.execute_tests('vcpus', [
  424. ('1', '1', True),
  425. ('100', '', False),
  426. ('-1', '', False),
  427. ('invalid', '', False),
  428. ])
  429. def test_017_debug(self):
  430. self.setup_appvm()
  431. self.execute_tests('debug', [
  432. ('on', 'True', True),
  433. ('off', 'False', True),
  434. ('true', 'True', True),
  435. ('0', 'False', True),
  436. ('invalid', '', False)
  437. ])
  438. def test_018_netvm(self):
  439. self.setup_appvm()
  440. default_netvm = self.qc.get_default_netvm().name
  441. netvms = [tpl for tpl in self.qc.values() if tpl.is_netvm()]
  442. if not netvms:
  443. self.skip("No netvms installed")
  444. some_netvm = netvms[0].name
  445. if some_netvm == default_netvm:
  446. if len(netvms) <= 1:
  447. self.skip("At least two NetVM/ProxyVM required")
  448. some_netvm = netvms[1].name
  449. self.execute_tests('netvm', [
  450. (some_netvm, some_netvm, True),
  451. (default_netvm, default_netvm, True),
  452. ('default', default_netvm, True),
  453. ('none', '', True),
  454. (self.testvm.name, '', False),
  455. ('invalid', '', False)
  456. ])
  457. def test_019_guiagent_installed(self):
  458. self.setup_hvm()
  459. self.execute_tests('guiagent_installed', self.bool_test_values)
  460. def test_020_qrexec_installed(self):
  461. self.setup_hvm()
  462. self.execute_tests('qrexec_installed', self.bool_test_values)
  463. def test_021_seamless_gui_mode(self):
  464. self.setup_hvm()
  465. # should reject seamless mode without gui agent
  466. self.execute_tests('seamless_gui_mode', [
  467. ('True', '', False),
  468. ('False', 'False', True),
  469. ])
  470. self.execute_tests('guiagent_installed', [('True', 'True', True)])
  471. self.execute_tests('seamless_gui_mode', self.bool_test_values)
  472. def test_022_drive(self):
  473. self.setup_hvm()
  474. self.execute_tests('drive', [
  475. ('hd:dom0:/tmp/drive.img', 'hd:dom0:/tmp/drive.img', True),
  476. ('hd:/tmp/drive.img', 'hd:dom0:/tmp/drive.img', True),
  477. ('cdrom:dom0:/tmp/drive.img', 'cdrom:dom0:/tmp/drive.img', True),
  478. ('cdrom:/tmp/drive.img', 'cdrom:dom0:/tmp/drive.img', True),
  479. ('/tmp/drive.img', 'cdrom:dom0:/tmp/drive.img', True),
  480. ('hd:drive.img', '', False),
  481. ('drive.img', '', False),
  482. ])
  483. def test_023_timezone(self):
  484. self.setup_hvm()
  485. self.execute_tests('timezone', [
  486. ('localtime', 'localtime', True),
  487. ('0', '0', True),
  488. ('3600', '3600', True),
  489. ('-7200', '-7200', True),
  490. ('invalid', '', False),
  491. ])
  492. def test_024_pv_reject_hvm_props(self):
  493. self.setup_appvm()
  494. self.execute_tests('guiagent_installed', [('False', '', False)])
  495. self.execute_tests('qrexec_installed', [('False', '', False)])
  496. self.execute_tests('drive', [('/tmp/drive.img', '', False)])
  497. self.execute_tests('timezone', [('localtime', '', False)])
  498. def test_025_hvm_reject_pv_props(self):
  499. self.setup_hvm()
  500. self.execute_tests('kernel', [('default', '', False)])
  501. self.execute_tests('kernelopts', [('default', '', False)])
  502. class TC_03_QvmRevertTemplateChanges(qubes.tests.SystemTestsMixin,
  503. qubes.tests.QubesTestCase):
  504. def setup_pv_template(self):
  505. self.test_template = self.qc.add_new_vm(
  506. "QubesTemplateVm",
  507. name=self.make_vm_name("pv-clone"),
  508. )
  509. self.test_template.clone_attrs(src_vm=self.qc.get_default_template())
  510. self.test_template.clone_disk_files(
  511. src_vm=self.qc.get_default_template(),
  512. verbose=False)
  513. self.save_and_reload_db()
  514. self.qc.unlock_db()
  515. def setup_hvm_template(self):
  516. self.test_template = self.qc.add_new_vm(
  517. "QubesTemplateHVm",
  518. name=self.make_vm_name("hvm"),
  519. )
  520. self.test_template.create_on_disk(verbose=False)
  521. self.save_and_reload_db()
  522. self.qc.unlock_db()
  523. def get_rootimg_checksum(self):
  524. p = subprocess.Popen(['sha1sum', self.test_template.root_img],
  525. stdout=subprocess.PIPE)
  526. return p.communicate()[0]
  527. def _do_test(self):
  528. checksum_before = self.get_rootimg_checksum()
  529. self.test_template.start(verbose=False)
  530. self.shutdown_and_wait(self.test_template)
  531. checksum_changed = self.get_rootimg_checksum()
  532. if checksum_before == checksum_changed:
  533. self.log.warning("template not modified, test result will be "
  534. "unreliable")
  535. with self.assertNotRaises(subprocess.CalledProcessError):
  536. subprocess.check_call(['sudo', 'qvm-revert-template-changes',
  537. '--force', self.test_template.name])
  538. checksum_after = self.get_rootimg_checksum()
  539. self.assertEquals(checksum_before, checksum_after)
  540. def test_000_revert_pv(self):
  541. """
  542. Test qvm-revert-template-changes for PV template
  543. """
  544. self.setup_pv_template()
  545. self._do_test()
  546. def test_000_revert_hvm(self):
  547. """
  548. Test qvm-revert-template-changes for HVM template
  549. """
  550. # TODO: have some system there, so the root.img will get modified
  551. self.setup_hvm_template()
  552. self._do_test()
  553. # vim: ts=4 sw=4 et