123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130 |
- #!/usr/bin/python
- # -*- coding: utf-8 -*-
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2013 Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
- # Copyright (C) 2013 Olivier Médoc <o_medoc@yahoo.fr>
- #
- # This program is free software; you can redistribute it and/or
- # modify it under the terms of the GNU General Public License
- # as published by the Free Software Foundation; either version 2
- # of the License, or (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program; if not, write to the Free Software
- # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
- #
- #
- from __future__ import unicode_literals
- from qubes import QubesException,QubesVmCollection
- from qubes import QubesVmClasses
- from qubes import system_path,vm_files
- from qubesutils import size_to_human, print_stdout, print_stderr, get_disk_usage
- import sys
- import os
- import fcntl
- import subprocess
- import re
- import shutil
- import tempfile
- import time
- import grp,pwd
- import errno
- import datetime
- from multiprocessing import Queue,Process
- BACKUP_DEBUG = False
- HEADER_FILENAME = 'backup-header'
- DEFAULT_CRYPTO_ALGORITHM = 'aes-256-cbc'
- DEFAULT_HMAC_ALGORITHM = 'SHA512'
- DEFAULT_COMPRESSION_FILTER = 'gzip'
- CURRENT_BACKUP_FORMAT_VERSION = '3'
- # Maximum size of error message get from process stderr (including VM process)
- MAX_STDERR_BYTES = 1024
- # header + qubes.xml max size
- HEADER_QUBES_XML_MAX_SIZE = 1024 * 1024
- # global state for backup_cancel()
- running_backup_operation = None
- class BackupOperationInfo:
- def __init__(self):
- self.canceled = False
- self.processes_to_kill_on_cancel = []
- self.tmpdir_to_remove = None
- class BackupCanceledError(QubesException):
- def __init__(self, msg, tmpdir=None):
- super(BackupCanceledError, self).__init__(msg)
- self.tmpdir = tmpdir
- class BackupHeader:
- version = 'version'
- encrypted = 'encrypted'
- compressed = 'compressed'
- compression_filter = 'compression-filter'
- crypto_algorithm = 'crypto-algorithm'
- hmac_algorithm = 'hmac-algorithm'
- bool_options = ['encrypted', 'compressed']
- int_options = ['version']
- def file_to_backup (file_path, subdir = None):
- sz = get_disk_usage (file_path)
- if subdir is None:
- abs_file_path = os.path.abspath (file_path)
- abs_base_dir = os.path.abspath (system_path["qubes_base_dir"]) + '/'
- abs_file_dir = os.path.dirname (abs_file_path) + '/'
- (nothing, dir, subdir) = abs_file_dir.partition (abs_base_dir)
- assert nothing == ""
- assert dir == abs_base_dir
- else:
- if len(subdir) > 0 and not subdir.endswith('/'):
- subdir += '/'
- return [ { "path" : file_path, "size": sz, "subdir": subdir} ]
- def backup_cancel():
- """
- Cancel currently running backup/restore operation
- @return: True if any operation was signaled
- """
- if running_backup_operation is None:
- return False
- running_backup_operation.canceled = True
- for proc in running_backup_operation.processes_to_kill_on_cancel:
- try:
- proc.terminate()
- except:
- pass
- return True
- def backup_prepare(vms_list = None, exclude_list = None,
- print_callback = print_stdout, hide_vm_names=True):
- """If vms = None, include all (sensible) VMs; exclude_list is always applied"""
- files_to_backup = file_to_backup (system_path["qubes_store_filename"])
- if exclude_list is None:
- exclude_list = []
- qvm_collection = QubesVmCollection()
- qvm_collection.lock_db_for_writing()
- qvm_collection.load()
- if vms_list is None:
- all_vms = [vm for vm in qvm_collection.values()]
- selected_vms = [vm for vm in all_vms if vm.include_in_backups]
- appvms_to_backup = [vm for vm in selected_vms if vm.is_appvm() and not vm.internal]
- netvms_to_backup = [vm for vm in selected_vms if vm.is_netvm() and not vm.qid == 0]
- template_vms_worth_backingup = [vm for vm in selected_vms if (vm.is_template() and not vm.installed_by_rpm)]
- dom0 = [ qvm_collection[0] ]
- vms_list = appvms_to_backup + netvms_to_backup + template_vms_worth_backingup + dom0
- vms_for_backup = vms_list
- # Apply exclude list
- if exclude_list:
- vms_for_backup = [vm for vm in vms_list if vm.name not in exclude_list]
- no_vms = len (vms_for_backup)
- there_are_running_vms = False
- fields_to_display = [
- { "name": "VM", "width": 16},
- { "name": "type","width": 12 },
- { "name": "size", "width": 12}
- ]
- # Display the header
- s = ""
- for f in fields_to_display:
- fmt="{{0:-^{0}}}-+".format(f["width"] + 1)
- s += fmt.format('-')
- print_callback(s)
- s = ""
- for f in fields_to_display:
- fmt="{{0:>{0}}} |".format(f["width"] + 1)
- s += fmt.format(f["name"])
- print_callback(s)
- s = ""
- for f in fields_to_display:
- fmt="{{0:-^{0}}}-+".format(f["width"] + 1)
- s += fmt.format('-')
- print_callback(s)
- files_to_backup_index = 0
- for vm in vms_for_backup:
- if vm.is_template():
- # handle templates later
- continue
- if vm.qid == 0:
- # handle dom0 later
- continue
- if hide_vm_names:
- subdir = 'vm%d/' % vm.qid
- else:
- subdir = None
- if vm.private_img is not None:
- files_to_backup += file_to_backup(vm.private_img, subdir)
- if vm.is_appvm():
- files_to_backup += file_to_backup(vm.icon_path, subdir)
- if vm.updateable:
- if os.path.exists(vm.dir_path + "/apps.templates"):
- # template
- files_to_backup += file_to_backup(vm.dir_path + "/apps.templates", subdir)
- else:
- # standaloneVM
- files_to_backup += file_to_backup(vm.dir_path + "/apps", subdir)
- if os.path.exists(vm.dir_path + "/kernels"):
- files_to_backup += file_to_backup(vm.dir_path + "/kernels", subdir)
- if os.path.exists (vm.firewall_conf):
- files_to_backup += file_to_backup(vm.firewall_conf, subdir)
- if 'appmenus_whitelist' in vm_files and \
- os.path.exists(os.path.join(vm.dir_path, vm_files['appmenus_whitelist'])):
- files_to_backup += file_to_backup(
- os.path.join(vm.dir_path, vm_files['appmenus_whitelist']),
- subdir)
- if vm.updateable:
- files_to_backup += file_to_backup(vm.root_img, subdir)
- s = ""
- fmt="{{0:>{0}}} |".format(fields_to_display[0]["width"] + 1)
- s += fmt.format(vm.name)
- fmt="{{0:>{0}}} |".format(fields_to_display[1]["width"] + 1)
- if vm.is_netvm():
- s += fmt.format("NetVM" + (" + Sys" if vm.updateable else ""))
- else:
- s += fmt.format("AppVM" + (" + Sys" if vm.updateable else ""))
- vm_size = reduce(lambda x, y: x + y["size"],
- files_to_backup[files_to_backup_index:],
- 0)
- files_to_backup_index = len(files_to_backup)
- fmt="{{0:>{0}}} |".format(fields_to_display[2]["width"] + 1)
- s += fmt.format(size_to_human(vm_size))
- if vm.is_running():
- s += " <-- The VM is running, please shut it down before proceeding with the backup!"
- there_are_running_vms = True
- print_callback(s)
- for vm in vms_for_backup:
- if not vm.is_template():
- # already handled
- continue
- if vm.qid == 0:
- # handle dom0 later
- continue
- vm_sz = vm.get_disk_utilization()
- if hide_vm_names:
- template_subdir = 'vm%d/' % vm.qid
- else:
- template_subdir = os.path.relpath(
- vm.dir_path,
- system_path["qubes_base_dir"]) + '/'
- template_to_backup = [ {
- "path": vm.dir_path + '/.',
- "size": vm_sz,
- "subdir": template_subdir } ]
- files_to_backup += template_to_backup
- s = ""
- fmt="{{0:>{0}}} |".format(fields_to_display[0]["width"] + 1)
- s += fmt.format(vm.name)
- fmt="{{0:>{0}}} |".format(fields_to_display[1]["width"] + 1)
- s += fmt.format("Template VM")
- fmt="{{0:>{0}}} |".format(fields_to_display[2]["width"] + 1)
- s += fmt.format(size_to_human(vm_sz))
- if vm.is_running():
- s += " <-- The VM is running, please shut it down before proceeding with the backup!"
- there_are_running_vms = True
- print_callback(s)
- # Initialize backup flag on all VMs
- vms_for_backup_qid = [vm.qid for vm in vms_for_backup]
- for vm in qvm_collection.values():
- vm.backup_content = False
- if vm.qid == 0:
- # handle dom0 later
- continue
- if vm.qid in vms_for_backup_qid:
- vm.backup_content = True
- vm.backup_size = vm.get_disk_utilization()
- if hide_vm_names:
- vm.backup_path = 'vm%d' % vm.qid
- else:
- vm.backup_path = os.path.relpath(vm.dir_path, system_path["qubes_base_dir"])
- # Dom0 user home
- if 0 in vms_for_backup_qid:
- local_user = grp.getgrnam('qubes').gr_mem[0]
- home_dir = pwd.getpwnam(local_user).pw_dir
- # Home dir should have only user-owned files, so fix it now to prevent
- # permissions problems - some root-owned files can left after
- # 'sudo bash' and similar commands
- subprocess.check_call(['sudo', 'chown', '-R', local_user, home_dir])
- home_sz = get_disk_usage(home_dir)
- home_to_backup = [ { "path" : home_dir, "size": home_sz, "subdir": 'dom0-home/'} ]
- files_to_backup += home_to_backup
- vm = qvm_collection[0]
- vm.backup_content = True
- vm.backup_size = home_sz
- vm.backup_path = os.path.join('dom0-home', os.path.basename(home_dir))
- s = ""
- fmt="{{0:>{0}}} |".format(fields_to_display[0]["width"] + 1)
- s += fmt.format('Dom0')
- fmt="{{0:>{0}}} |".format(fields_to_display[1]["width"] + 1)
- s += fmt.format("User home")
- fmt="{{0:>{0}}} |".format(fields_to_display[2]["width"] + 1)
- s += fmt.format(size_to_human(home_sz))
- print_callback(s)
- qvm_collection.save()
- # FIXME: should be after backup completed
- qvm_collection.unlock_db()
- total_backup_sz = 0
- for file in files_to_backup:
- total_backup_sz += file["size"]
- s = ""
- for f in fields_to_display:
- fmt="{{0:-^{0}}}-+".format(f["width"] + 1)
- s += fmt.format('-')
- print_callback(s)
- s = ""
- fmt="{{0:>{0}}} |".format(fields_to_display[0]["width"] + 1)
- s += fmt.format("Total size:")
- fmt="{{0:>{0}}} |".format(fields_to_display[1]["width"] + 1 + 2 + fields_to_display[2]["width"] + 1)
- s += fmt.format(size_to_human(total_backup_sz))
- print_callback(s)
- s = ""
- for f in fields_to_display:
- fmt="{{0:-^{0}}}-+".format(f["width"] + 1)
- s += fmt.format('-')
- print_callback(s)
- vms_not_for_backup = [vm.name for vm in qvm_collection.values() if not vm
- .backup_content]
- print_callback("VMs not selected for backup: %s" % " ".join(
- vms_not_for_backup))
- if (there_are_running_vms):
- raise QubesException("Please shutdown all VMs before proceeding.")
- for fileinfo in files_to_backup:
- assert len(fileinfo["subdir"]) == 0 or fileinfo["subdir"][-1] == '/', \
- "'subdir' must ends with a '/': %s" % unicode(fileinfo)
- return files_to_backup
- class SendWorker(Process):
- def __init__(self, queue, base_dir, backup_stdout):
- super(SendWorker, self).__init__()
- self.queue = queue
- self.base_dir = base_dir
- self.backup_stdout = backup_stdout
- def run(self):
- if BACKUP_DEBUG:
- print "Started sending thread"
- if BACKUP_DEBUG:
- print "Moving to temporary dir", self.base_dir
- os.chdir(self.base_dir)
- for filename in iter(self.queue.get,None):
- if filename == "FINISHED" or filename == "ERROR":
- break
- if BACKUP_DEBUG:
- print "Sending file", filename
- # This tar used for sending data out need to be as simple, as
- # simple, as featureless as possible. It will not be
- # verified before untaring.
- tar_final_cmd = ["tar", "-cO", "--posix",
- "-C", self.base_dir, filename]
- final_proc = subprocess.Popen (tar_final_cmd,
- stdin=subprocess.PIPE, stdout=self.backup_stdout)
- if final_proc.wait() >= 2:
- # handle only exit code 2 (tar fatal error) or greater (call failed?)
- raise QubesException("ERROR: Failed to write the backup, out of disk space? "
- "Check console output or ~/.xsession-errors for details.")
- # Delete the file as we don't need it anymore
- if BACKUP_DEBUG:
- print "Removing file", filename
- os.remove(filename)
- if BACKUP_DEBUG:
- print "Finished sending thread"
- def prepare_backup_header(target_directory, passphrase, compressed=False,
- encrypted=False,
- hmac_algorithm=DEFAULT_HMAC_ALGORITHM,
- crypto_algorithm=DEFAULT_CRYPTO_ALGORITHM,
- compression_filter=None):
- header_file_path = os.path.join(target_directory, HEADER_FILENAME)
- with open(header_file_path, "w") as f:
- f.write(str("%s=%s\n" % (BackupHeader.version,
- CURRENT_BACKUP_FORMAT_VERSION)))
- f.write(str("%s=%s\n" % (BackupHeader.hmac_algorithm, hmac_algorithm)))
- f.write(str("%s=%s\n" % (BackupHeader.crypto_algorithm,
- crypto_algorithm)))
- f.write(str("%s=%s\n" % (BackupHeader.encrypted, str(encrypted))))
- f.write(str("%s=%s\n" % (BackupHeader.compressed, str(compressed))))
- if compressed:
- f.write(str("%s=%s\n" % (BackupHeader.compression_filter,
- str(compression_filter))))
- hmac = subprocess.Popen (["openssl", "dgst",
- "-" + hmac_algorithm, "-hmac", passphrase],
- stdin=open(header_file_path, "r"),
- stdout=open(header_file_path + ".hmac", "w"))
- if hmac.wait() != 0:
- raise QubesException("Failed to compute hmac of header file")
- return (HEADER_FILENAME, HEADER_FILENAME+".hmac")
- def backup_do(base_backup_dir, files_to_backup, passphrase,
- progress_callback = None, encrypted=False, appvm=None,
- compressed=False, hmac_algorithm=DEFAULT_HMAC_ALGORITHM,
- crypto_algorithm=DEFAULT_CRYPTO_ALGORITHM):
- global running_backup_operation
- total_backup_sz = 0
- passphrase = passphrase.encode('utf-8')
- for file in files_to_backup:
- total_backup_sz += file["size"]
- if isinstance(compressed, str):
- compression_filter = compressed
- else:
- compression_filter = DEFAULT_COMPRESSION_FILTER
- running_backup_operation = BackupOperationInfo()
- vmproc = None
- if appvm != None:
- # Prepare the backup target (Qubes service call)
- backup_target = "QUBESRPC qubes.Backup dom0"
- # If APPVM, STDOUT is a PIPE
- vmproc = appvm.run(command=backup_target, passio_popen=True,
- passio_stderr=True)
- vmproc.stdin.write(base_backup_dir.
- replace("\r", "").replace("\n", "")+"\n")
- backup_stdout = vmproc.stdin
- running_backup_operation.processes_to_kill_on_cancel.append(vmproc)
- else:
- # Prepare the backup target (local file)
- if os.path.isdir(base_backup_dir):
- backup_target = base_backup_dir + "/qubes-{0}". \
- format(time.strftime("%Y-%m-%dT%H%M%S"))
- else:
- backup_target = base_backup_dir
- # Create the target directory
- if not os.path.exists (os.path.dirname(base_backup_dir)):
- raise QubesException(
- "ERROR: the backup directory for {0} does not exists".
- format(base_backup_dir))
- # If not APPVM, STDOUT is a local file
- backup_stdout = open(backup_target,'wb')
- global blocks_backedup
- blocks_backedup = 0
- if callable(progress_callback):
- progress = blocks_backedup * 11 / total_backup_sz
- progress_callback(progress)
- backup_tmpdir = tempfile.mkdtemp(prefix="/var/tmp/backup_")
- running_backup_operation.tmpdir_to_remove = backup_tmpdir
- # Tar with tapelength does not deals well with stdout (close stdout between
- # two tapes)
- # For this reason, we will use named pipes instead
- if BACKUP_DEBUG:
- print "Working in", backup_tmpdir
- backup_pipe = os.path.join(backup_tmpdir, "backup_pipe")
- if BACKUP_DEBUG:
- print "Creating pipe in:", backup_pipe
- os.mkfifo(backup_pipe)
- if BACKUP_DEBUG:
- print "Will backup:", files_to_backup
- header_files = prepare_backup_header(backup_tmpdir, passphrase,
- compressed=bool(compressed),
- encrypted=encrypted,
- hmac_algorithm=hmac_algorithm,
- crypto_algorithm=crypto_algorithm,
- compression_filter=compression_filter)
- # Setup worker to send encrypted data chunks to the backup_target
- def compute_progress(new_size, total_backup_sz):
- global blocks_backedup
- blocks_backedup += new_size
- if callable(progress_callback):
- progress = blocks_backedup / float(total_backup_sz)
- progress_callback(int(round(progress*100,2)))
- to_send = Queue(10)
- send_proc = SendWorker(to_send, backup_tmpdir, backup_stdout)
- send_proc.start()
- for f in header_files:
- to_send.put(f)
- for filename in files_to_backup:
- if BACKUP_DEBUG:
- print "Backing up", filename
- backup_tempfile = os.path.join(backup_tmpdir,
- filename["subdir"],
- os.path.basename(filename["path"]))
- if BACKUP_DEBUG:
- print "Using temporary location:", backup_tempfile
- # Ensure the temporary directory exists
- if not os.path.isdir(os.path.dirname(backup_tempfile)):
- os.makedirs(os.path.dirname(backup_tempfile))
- # The first tar cmd can use any complex feature as we want. Files will
- # be verified before untaring this.
- # Prefix the path in archive with filename["subdir"] to have it verified during untar
- tar_cmdline = ["tar", "-Pc", '--sparse',
- "-f", backup_pipe,
- '-C', os.path.dirname(filename["path"]),
- '--xform', 's:^%s:%s\\0:' % (
- os.path.basename(filename["path"]),
- filename["subdir"]),
- os.path.basename(filename["path"])
- ]
- if compressed:
- tar_cmdline.insert(-1, "--use-compress-program=%s" % compression_filter)
- if BACKUP_DEBUG:
- print " ".join(tar_cmdline)
- # Tips: Popen(bufsize=0)
- # Pipe: tar-sparse | encryptor [| hmac] | tar | backup_target
- # Pipe: tar-sparse [| hmac] | tar | backup_target
- tar_sparse = subprocess.Popen (tar_cmdline, stdin=subprocess.PIPE,
- stderr=(open(os.devnull, 'w') if not BACKUP_DEBUG else None))
- running_backup_operation.processes_to_kill_on_cancel.append(tar_sparse)
- # Wait for compressor (tar) process to finish or for any error of other
- # subprocesses
- i = 0
- run_error = "paused"
- encryptor = None
- if encrypted:
- # Start encrypt
- # If no cipher is provided, the data is forwarded unencrypted !!!
- encryptor = subprocess.Popen (["openssl", "enc",
- "-e", "-" + crypto_algorithm,
- "-pass", "pass:"+passphrase],
- stdin=open(backup_pipe,'rb'), stdout=subprocess.PIPE)
- pipe = encryptor.stdout
- else:
- pipe = open(backup_pipe,'rb')
- while run_error == "paused":
- # Start HMAC
- hmac = subprocess.Popen (["openssl", "dgst",
- "-" + hmac_algorithm, "-hmac", passphrase],
- stdin=subprocess.PIPE, stdout=subprocess.PIPE)
- # Prepare a first chunk
- chunkfile = backup_tempfile + "." + "%03d" % i
- i += 1
- chunkfile_p = open(chunkfile,'wb')
- common_args = {
- 'backup_target': chunkfile_p,
- 'total_backup_sz': total_backup_sz,
- 'hmac': hmac,
- 'vmproc': vmproc,
- 'addproc': tar_sparse,
- 'progress_callback': compute_progress,
- 'size_limit': 100 * 1024 * 1024,
- }
- run_error = wait_backup_feedback(
- in_stream=pipe, streamproc=encryptor,
- **common_args)
- chunkfile_p.close()
- if BACKUP_DEBUG:
- print "Wait_backup_feedback returned:", run_error
- if running_backup_operation.canceled:
- try:
- tar_sparse.terminate()
- except:
- pass
- try:
- hmac.terminate()
- except:
- pass
- tar_sparse.wait()
- hmac.wait()
- to_send.put("ERROR")
- send_proc.join()
- shutil.rmtree(backup_tmpdir)
- running_backup_operation = None
- raise BackupCanceledError("Backup canceled")
- if run_error and run_error != "size_limit":
- send_proc.terminate()
- if run_error == "VM" and vmproc:
- raise QubesException("Failed to write the backup, VM output:\n" +
- vmproc.stderr.read(MAX_STDERR_BYTES))
- else:
- raise QubesException("Failed to perform backup: error in "+ \
- run_error)
- # Send the chunk to the backup target
- to_send.put(os.path.relpath(chunkfile, backup_tmpdir))
- # Close HMAC
- hmac.stdin.close()
- hmac.wait()
- if BACKUP_DEBUG:
- print "HMAC proc return code:", hmac.poll()
- # Write HMAC data next to the chunk file
- hmac_data = hmac.stdout.read()
- if BACKUP_DEBUG:
- print "Writing hmac to", chunkfile+".hmac"
- hmac_file = open(chunkfile+".hmac",'w')
- hmac_file.write(hmac_data)
- hmac_file.flush()
- hmac_file.close()
- # Send the HMAC to the backup target
- to_send.put(os.path.relpath(chunkfile, backup_tmpdir)+".hmac")
- if tar_sparse.poll() is None or run_error == "size_limit":
- run_error="paused"
- else:
- running_backup_operation.processes_to_kill_on_cancel.remove(
- tar_sparse)
- if BACKUP_DEBUG:
- print "Finished tar sparse with exit code", tar_sparse\
- .poll()
- pipe.close()
- to_send.put("FINISHED")
- send_proc.join()
- shutil.rmtree(backup_tmpdir)
- if running_backup_operation.canceled:
- running_backup_operation = None
- raise BackupCanceledError("Backup canceled")
- running_backup_operation = None
- if send_proc.exitcode != 0:
- raise QubesException("Failed to send backup: error in the sending process")
- if vmproc:
- if BACKUP_DEBUG:
- print "VMProc1 proc return code:", vmproc.poll()
- print "Sparse1 proc return code:", tar_sparse.poll()
- vmproc.stdin.close()
- # Save date of last backup
- qvm_collection = QubesVmCollection()
- qvm_collection.lock_db_for_writing()
- qvm_collection.load()
- for vm in qvm_collection.values():
- if vm.backup_content:
- vm.backup_timestamp = datetime.datetime.now()
- qvm_collection.save()
- qvm_collection.unlock_db()
- '''
- ' Wait for backup chunk to finish
- ' - Monitor all the processes (streamproc, hmac, vmproc, addproc) for errors
- ' - Copy stdout of streamproc to backup_target and hmac stdin if available
- ' - Compute progress based on total_backup_sz and send progress to
- ' progress_callback function
- ' - Returns if
- ' - one of the monitored processes error out (streamproc, hmac, vmproc,
- ' addproc), along with the processe that failed
- ' - all of the monitored processes except vmproc finished successfully
- ' (vmproc termination is controlled by the python script)
- ' - streamproc does not delivers any data anymore (return with the error
- ' "")
- ' - size_limit is provided and is about to be exceeded
- '''
- def wait_backup_feedback(progress_callback, in_stream, streamproc,
- backup_target, total_backup_sz, hmac=None, vmproc=None, addproc=None,
- remove_trailing_bytes=0, size_limit=None):
- buffer_size = 409600
- run_error = None
- run_count = 1
- bytes_copied = 0
- while run_count > 0 and run_error == None:
- if size_limit and bytes_copied + buffer_size > size_limit:
- return "size_limit"
- buffer = in_stream.read(buffer_size)
- progress_callback(len(buffer), total_backup_sz)
- bytes_copied += len(buffer)
- run_count = 0
- if hmac:
- retcode=hmac.poll()
- if retcode != None:
- if retcode != 0:
- run_error = "hmac"
- else:
- run_count += 1
- if addproc:
- retcode=addproc.poll()
- if retcode != None:
- if retcode != 0:
- run_error = "addproc"
- else:
- run_count += 1
- if vmproc:
- retcode = vmproc.poll()
- if retcode != None:
- if retcode != 0:
- run_error = "VM"
- if BACKUP_DEBUG:
- print vmproc.stdout.read()
- else:
- # VM should run until the end
- pass
- if streamproc:
- retcode=streamproc.poll()
- if retcode != None:
- if retcode != 0:
- run_error = "streamproc"
- break
- elif retcode == 0 and len(buffer) <= 0:
- return ""
- run_count += 1
- else:
- if len(buffer) <= 0:
- return ""
- try:
- backup_target.write(buffer)
- except IOError as e:
- if e.errno == errno.EPIPE:
- run_error = "target"
- else:
- raise
- if hmac:
- hmac.stdin.write(buffer)
- return run_error
- def verify_hmac(filename, hmacfile, passphrase, algorithm):
- if BACKUP_DEBUG:
- print "Verifying file "+filename
- if hmacfile != filename + ".hmac":
- raise QubesException(
- "ERROR: expected hmac for {}, but got {}".\
- format(filename, hmacfile))
- hmac_proc = subprocess.Popen (["openssl", "dgst", "-" + algorithm,
- "-hmac", passphrase],
- stdin=open(filename,'rb'),
- stdout=subprocess.PIPE, stderr=subprocess.PIPE)
- hmac_stdout, hmac_stderr = hmac_proc.communicate()
- if len(hmac_stderr) > 0:
- raise QubesException("ERROR: verify file {0}: {1}".format(filename, hmac_stderr))
- else:
- if BACKUP_DEBUG:
- print "Loading hmac for file " + filename
- hmac = load_hmac(open(hmacfile,'r').read())
- if len(hmac) > 0 and load_hmac(hmac_stdout) == hmac:
- os.unlink(hmacfile)
- if BACKUP_DEBUG:
- print "File verification OK -> Sending file " + filename
- return True
- else:
- raise QubesException(
- "ERROR: invalid hmac for file {0}: {1}. " \
- "Is the passphrase correct?".\
- format(filename, load_hmac(hmac_stdout)))
- # Not reachable
- return False
- class ExtractWorker2(Process):
- def __init__(self, queue, base_dir, passphrase, encrypted, total_size,
- print_callback, error_callback, progress_callback, vmproc=None,
- compressed = False, crypto_algorithm=DEFAULT_CRYPTO_ALGORITHM,
- verify_only=False):
- super(ExtractWorker2, self).__init__()
- self.queue = queue
- self.base_dir = base_dir
- self.passphrase = passphrase
- self.encrypted = encrypted
- self.compressed = compressed
- self.crypto_algorithm = crypto_algorithm
- self.verify_only = verify_only
- self.total_size = total_size
- self.blocks_backedup = 0
- self.tar2_process = None
- self.tar2_current_file = None
- self.decompressor_process = None
- self.decryptor_process = None
- self.print_callback = print_callback
- self.error_callback = error_callback
- self.progress_callback = progress_callback
- self.vmproc = vmproc
- self.restore_pipe = os.path.join(self.base_dir,"restore_pipe")
- if BACKUP_DEBUG:
- print "Creating pipe in:", self.restore_pipe
- os.mkfifo(self.restore_pipe)
- self.stderr_encoding = sys.stderr.encoding or 'utf-8'
- def compute_progress(self, new_size, total_size):
- if self.progress_callback:
- self.blocks_backedup += new_size
- progress = self.blocks_backedup / float(self.total_size)
- progress = int(round(progress*100,2))
- self.progress_callback(progress)
- def collect_tar_output(self):
- if not self.tar2_process.stderr:
- return
- if self.tar2_process.poll() is None:
- try:
- new_lines = self.tar2_process.stderr\
- .read(MAX_STDERR_BYTES).splitlines()
- except IOError as e:
- if e.errno == errno.EAGAIN:
- return
- else:
- raise
- else:
- new_lines = self.tar2_process.stderr.readlines()
- new_lines = map(lambda x: x.decode(self.stderr_encoding), new_lines)
- if not BACKUP_DEBUG:
- msg_re = re.compile(r".*#[0-9].*restore_pipe")
- new_lines = filter(lambda x: not msg_re.match(x), new_lines)
- self.tar2_stderr += new_lines
- def run(self):
- try:
- self.__run__()
- except Exception as e:
- exc_type, exc_value, exc_traceback = sys.exc_info()
- # Cleanup children
- for process in [self.decompressor_process,
- self.decryptor_process,
- self.tar2_process]:
- if process:
- # FIXME: kill()?
- try:
- process.terminate()
- except OSError:
- pass
- process.wait()
- self.error_callback("ERROR: " + unicode(e))
- raise e, None, exc_traceback
- def __run__(self):
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Started sending thread")
- self.print_callback("Moving to dir "+self.base_dir)
- os.chdir(self.base_dir)
- filename = None
- for filename in iter(self.queue.get, None):
- if filename == "FINISHED" or filename == "ERROR":
- break
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Extracting file "+filename)
- if filename.endswith('.000'):
- # next file
- if self.tar2_process != None:
- if self.tar2_process.wait() != 0:
- self.collect_tar_output()
- self.error_callback(
- "ERROR: unable to extract files for {0}, tar "
- "output:\n {1}".\
- format(self.tar2_current_file,
- "\n ".join(self.tar2_stderr)))
- else:
- # Finished extracting the tar file
- self.tar2_process = None
- self.tar2_current_file = None
- tar2_cmdline = ['tar',
- '-%sMk%sf' % ("t" if self.verify_only else "x",
- "v" if BACKUP_DEBUG else ""),
- self.restore_pipe,
- os.path.relpath(filename.rstrip('.000'))]
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Running command "+
- unicode(tar2_cmdline))
- self.tar2_process = subprocess.Popen(tar2_cmdline,
- stdin=subprocess.PIPE,
- stderr=subprocess.PIPE)
- fcntl.fcntl(self.tar2_process.stderr.fileno(), fcntl.F_SETFL,
- fcntl.fcntl(self.tar2_process.stderr.fileno(),
- fcntl.F_GETFL) | os.O_NONBLOCK)
- self.tar2_stderr = []
- elif not self.tar2_process:
- # Extracting of the current archive failed, skip to the next
- # archive
- if not BACKUP_DEBUG:
- os.remove(filename)
- continue
- else:
- self.collect_tar_output()
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Releasing next chunck")
- self.tar2_process.stdin.write("\n")
- self.tar2_process.stdin.flush()
- self.tar2_current_file = filename
- pipe = open(self.restore_pipe,'wb')
- common_args = {
- 'backup_target': pipe,
- 'total_backup_sz': self.total_size,
- 'hmac': None,
- 'vmproc': self.vmproc,
- 'addproc': self.tar2_process
- }
- if self.encrypted:
- # Start decrypt
- self.decryptor_process = subprocess.Popen (["openssl", "enc",
- "-d", "-" + self.crypto_algorithm,
- "-pass", "pass:"+self.passphrase] +
- (["-z"] if self.compressed else []),
- stdin=open(filename,'rb'),
- stdout=subprocess.PIPE)
- run_error = wait_backup_feedback(
- progress_callback=self.compute_progress,
- in_stream=self.decryptor_process.stdout,
- streamproc=self.decryptor_process,
- **common_args)
- elif self.compressed:
- self.decompressor_process = subprocess.Popen (["gzip", "-d"],
- stdin=open(filename,'rb'),
- stdout=subprocess.PIPE)
- run_error = wait_backup_feedback(
- progress_callback=self.compute_progress,
- in_stream=self.decompressor_process.stdout,
- streamproc=self.decompressor_process,
- **common_args)
- else:
- run_error = wait_backup_feedback(
- progress_callback=self.compute_progress,
- in_stream=open(filename,"rb"), streamproc=None,
- **common_args)
- try:
- pipe.close()
- except IOError as e:
- if e.errno == errno.EPIPE:
- if BACKUP_DEBUG:
- self.error_callback("Got EPIPE while closing pipe to the inner tar process")
- # ignore the error
- else:
- raise
- if len(run_error):
- if run_error == "target":
- self.collect_tar_output()
- details = "\n".join(self.tar2_stderr)
- else:
- details = "%s failed" % run_error
- self.tar2_process.terminate()
- self.tar2_process.wait()
- self.tar2_process = None
- self.error_callback("Error while processing '%s': %s " % \
- (self.tar2_current_file, details))
- # Delete the file as we don't need it anymore
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Removing file "+filename)
- os.remove(filename)
- os.unlink(self.restore_pipe)
- if self.tar2_process is not None:
- if filename == "ERROR":
- self.tar2_process.terminate()
- self.tar2_process.wait()
- elif self.tar2_process.wait() != 0:
- self.collect_tar_output()
- raise QubesException(
- "unable to extract files for {0}.{1} Tar command "
- "output: %s".
- format(self.tar2_current_file,
- (" Perhaps the backup is encrypted?"
- if not self.encrypted else "",
- "\n".join(self.tar2_stderr))))
- else:
- # Finished extracting the tar file
- self.tar2_process = None
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Finished extracting thread")
- class ExtractWorker3(ExtractWorker2):
- def __init__(self, queue, base_dir, passphrase, encrypted, total_size,
- print_callback, error_callback, progress_callback, vmproc=None,
- compressed=False, crypto_algorithm=DEFAULT_CRYPTO_ALGORITHM,
- compression_filter = None, verify_only=False):
- super(ExtractWorker3, self).__init__(queue, base_dir, passphrase,
- encrypted, total_size,
- print_callback, error_callback,
- progress_callback, vmproc,
- compressed, crypto_algorithm,
- verify_only)
- self.compression_filter = compression_filter
- os.unlink(self.restore_pipe)
- def __run__(self):
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Started sending thread")
- self.print_callback("Moving to dir "+self.base_dir)
- os.chdir(self.base_dir)
- filename = None
- input_pipe = None
- for filename in iter(self.queue.get, None):
- if filename == "FINISHED" or filename == "ERROR":
- break
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Extracting file "+filename)
- if filename.endswith('.000'):
- # next file
- if self.tar2_process != None:
- input_pipe.close()
- if self.tar2_process.wait() != 0:
- self.collect_tar_output()
- self.error_callback(
- "ERROR: unable to extract files for {0}, tar "
- "output:\n {1}".\
- format(self.tar2_current_file,
- "\n ".join(self.tar2_stderr)))
- else:
- # Finished extracting the tar file
- self.tar2_process = None
- self.tar2_current_file = None
- tar2_cmdline = ['tar',
- '-%sk%s' % ("t" if self.verify_only else "x",
- "v" if BACKUP_DEBUG else ""),
- os.path.relpath(filename.rstrip('.000'))]
- if self.compressed:
- if self.compression_filter:
- tar2_cmdline.insert(-1,
- "--use-compress-program=%s" %
- self.compression_filter)
- else:
- tar2_cmdline.insert(-1, "--use-compress-program=%s" %
- DEFAULT_COMPRESSION_FILTER)
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Running command "+
- unicode(tar2_cmdline))
- if self.encrypted:
- # Start decrypt
- self.decryptor_process = subprocess.Popen (["openssl", "enc",
- "-d", "-" + self.crypto_algorithm,
- "-pass", "pass:"+self.passphrase],
- stdin=subprocess.PIPE,
- stdout=subprocess.PIPE)
- self.tar2_process = subprocess.Popen(tar2_cmdline,
- stdin=self.decryptor_process.stdout,
- stderr=subprocess.PIPE)
- input_pipe = self.decryptor_process.stdin
- else:
- self.tar2_process = subprocess.Popen(tar2_cmdline,
- stdin=subprocess.PIPE,
- stderr=subprocess.PIPE)
- input_pipe = self.tar2_process.stdin
- fcntl.fcntl(self.tar2_process.stderr.fileno(), fcntl.F_SETFL,
- fcntl.fcntl(self.tar2_process.stderr.fileno(),
- fcntl.F_GETFL) | os.O_NONBLOCK)
- self.tar2_stderr = []
- elif not self.tar2_process:
- # Extracting of the current archive failed, skip to the next
- # archive
- if not BACKUP_DEBUG:
- os.remove(filename)
- continue
- else:
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Releasing next chunck")
- self.tar2_current_file = filename
- common_args = {
- 'backup_target': input_pipe,
- 'total_backup_sz': self.total_size,
- 'hmac': None,
- 'vmproc': self.vmproc,
- 'addproc': self.tar2_process
- }
- run_error = wait_backup_feedback(
- progress_callback=self.compute_progress,
- in_stream=open(filename,"rb"), streamproc=None,
- **common_args)
- if len(run_error):
- if run_error == "target":
- self.collect_tar_output()
- details = "\n".join(self.tar2_stderr)
- else:
- details = "%s failed" % run_error
- if self.decryptor_process:
- self.decryptor_process.terminate()
- self.decryptor_process.wait()
- self.decryptor_process = None
- self.tar2_process.terminate()
- self.tar2_process.wait()
- self.tar2_process = None
- self.error_callback("Error while processing '%s': %s " % \
- (self.tar2_current_file, details))
- # Delete the file as we don't need it anymore
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Removing file "+filename)
- os.remove(filename)
- if self.tar2_process is not None:
- input_pipe.close()
- if filename == "ERROR":
- if self.decryptor_process:
- self.decryptor_process.terminate()
- self.decryptor_process.wait()
- self.decryptor_process = None
- self.tar2_process.terminate()
- self.tar2_process.wait()
- elif self.tar2_process.wait() != 0:
- self.collect_tar_output()
- raise QubesException(
- "unable to extract files for {0}.{1} Tar command "
- "output: %s".
- format(self.tar2_current_file,
- (" Perhaps the backup is encrypted?"
- if not self.encrypted else "",
- "\n".join(self.tar2_stderr))))
- else:
- # Finished extracting the tar file
- self.tar2_process = None
- if BACKUP_DEBUG and callable(self.print_callback):
- self.print_callback("Finished extracting thread")
- def get_supported_hmac_algo(hmac_algorithm):
- # Start with provided default
- if hmac_algorithm:
- yield hmac_algorithm
- proc = subprocess.Popen(['openssl', 'list-message-digest-algorithms'],
- stdout=subprocess.PIPE)
- for algo in proc.stdout.readlines():
- if '=>' in algo:
- continue
- yield algo.strip()
- proc.wait()
- def parse_backup_header(filename):
- header_data = {}
- with open(filename, 'r') as f:
- for line in f.readlines():
- if line.count('=') != 1:
- raise QubesException("Invalid backup header (line %s)" % line)
- (key, value) = line.strip().split('=')
- if not any([key == getattr(BackupHeader, attr) for attr in dir(
- BackupHeader)]):
- # Ignoring unknown option
- continue
- if key in BackupHeader.bool_options:
- value = value.lower() in ["1", "true", "yes"]
- elif key in BackupHeader.int_options:
- value = int(value)
- header_data[key] = value
- return header_data
- def restore_vm_dirs (backup_source, restore_tmpdir, passphrase, vms_dirs, vms,
- vms_size, print_callback=None, error_callback=None,
- progress_callback=None, encrypted=False, appvm=None,
- compressed = False, hmac_algorithm=DEFAULT_HMAC_ALGORITHM,
- crypto_algorithm=DEFAULT_CRYPTO_ALGORITHM,
- verify_only=False, format_version = CURRENT_BACKUP_FORMAT_VERSION,
- compression_filter = None):
- global running_backup_operation
- if callable(print_callback):
- if BACKUP_DEBUG:
- print_callback("Working in temporary dir:"+restore_tmpdir)
- print_callback("Extracting data: " + size_to_human(vms_size)+" to restore")
- passphrase = passphrase.encode('utf-8')
- header_data = None
- vmproc = None
- if appvm != None:
- # Prepare the backup target (Qubes service call)
- backup_target = "QUBESRPC qubes.Restore dom0"
- # If APPVM, STDOUT is a PIPE
- vmproc = appvm.run(command = backup_target, passio_popen = True, passio_stderr=True)
- vmproc.stdin.write(backup_source.replace("\r","").replace("\n","")+"\n")
- # Send to tar2qfile the VMs that should be extracted
- vmproc.stdin.write(" ".join(vms_dirs)+"\n")
- if running_backup_operation:
- running_backup_operation.processes_to_kill_on_cancel.append(vmproc)
- backup_stdin = vmproc.stdout
- tar1_command = ['/usr/libexec/qubes/qfile-dom0-unpacker',
- str(os.getuid()), restore_tmpdir, '-v']
- else:
- backup_stdin = open(backup_source,'rb')
- tar1_command = ['tar',
- '-ixvf', backup_source,
- '-C', restore_tmpdir] + vms_dirs
- tar1_env = os.environ.copy()
- # TODO: add some safety margin?
- tar1_env['UPDATES_MAX_BYTES'] = str(vms_size)
- # Restoring only header
- if vms_dirs and vms_dirs[0] == HEADER_FILENAME:
- # backup-header, backup-header.hmac, qubes-xml.000, qubes-xml.000.hmac
- tar1_env['UPDATES_MAX_FILES'] = '4'
- else:
- # Currently each VM consists of at most 7 archives (count
- # file_to_backup calls in backup_prepare()), but add some safety
- # margin for further extensions. Each archive is divided into 100MB
- # chunks. Additionally each file have own hmac file. So assume upper
- # limit as 2*(10*COUNT_OF_VMS+TOTAL_SIZE/100MB)
- tar1_env['UPDATES_MAX_FILES'] = str(2*(10*len(vms_dirs) +
- int(vms_size/(100*1024*1024))))
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Run command"+unicode(tar1_command))
- command = subprocess.Popen(tar1_command,
- stdin=backup_stdin,
- stdout=vmproc.stdin if vmproc else subprocess.PIPE,
- stderr=subprocess.PIPE,
- env=tar1_env)
- if running_backup_operation:
- running_backup_operation.processes_to_kill_on_cancel.append(command)
- # qfile-dom0-unpacker output filelist on stderr (and have stdout connected
- # to the VM), while tar output filelist on stdout
- if appvm:
- filelist_pipe = command.stderr
- # let qfile-dom0-unpacker hold the only open FD to the write end of
- # pipe, otherwise qrexec-client will not receive EOF when
- # qfile-dom0-unpacker terminates
- vmproc.stdin.close()
- else:
- filelist_pipe = command.stdout
- expect_tar_error = False
- to_extract = Queue()
- nextfile = None
- # If want to analyze backup header, do it now
- if vms_dirs and vms_dirs[0] == HEADER_FILENAME:
- filename = filelist_pipe.readline().strip()
- hmacfile = filelist_pipe.readline().strip()
- if not appvm:
- nextfile = filelist_pipe.readline().strip()
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Got backup header and hmac: %s, %s" % (filename,
- hmacfile))
- if not filename or filename=="EOF" or \
- not hmacfile or hmacfile == "EOF":
- if appvm:
- vmproc.wait()
- proc_error_msg = vmproc.stderr.read(MAX_STDERR_BYTES)
- else:
- command.wait()
- proc_error_msg = command.stderr.read(MAX_STDERR_BYTES)
- raise QubesException("Premature end of archive while receiving "
- "backup header. Process output:\n" +
- proc_error_msg)
- filename = os.path.join(restore_tmpdir, filename)
- hmacfile = os.path.join(restore_tmpdir, hmacfile)
- file_ok = False
- for hmac_algo in get_supported_hmac_algo(hmac_algorithm):
- try:
- if verify_hmac(filename, hmacfile, passphrase, hmac_algo):
- file_ok = True
- hmac_algorithm = hmac_algo
- break
- except QubesException:
- # Ignore exception here, try the next algo
- pass
- if not file_ok:
- raise QubesException("Corrupted backup header (hmac verification "
- "failed). Is the password correct?")
- if os.path.basename(filename) == HEADER_FILENAME:
- header_data = parse_backup_header(filename)
- if BackupHeader.version in header_data:
- format_version = header_data[BackupHeader.version]
- if BackupHeader.crypto_algorithm in header_data:
- crypto_algorithm = header_data[BackupHeader.crypto_algorithm]
- if BackupHeader.hmac_algorithm in header_data:
- hmac_algorithm = header_data[BackupHeader.hmac_algorithm]
- if BackupHeader.compressed in header_data:
- compressed = header_data[BackupHeader.compressed]
- if BackupHeader.encrypted in header_data:
- encrypted = header_data[BackupHeader.encrypted]
- if BackupHeader.compression_filter in header_data:
- compression_filter = header_data[BackupHeader.compression_filter]
- os.unlink(filename)
- else:
- # if no header found, create one with guessed HMAC algo
- header_data = { BackupHeader.hmac_algorithm: hmac_algorithm }
- # If this isn't backup header, pass it to ExtractWorker
- to_extract.put(filename)
- # when tar do not find expected file in archive, it exit with
- # code 2. This will happen because we've requested backup-header
- # file, but the archive do not contain it. Ignore this particular
- # error.
- if not appvm:
- expect_tar_error = True
- # Setup worker to extract encrypted data chunks to the restore dirs
- # Create the process here to pass it options extracted from backup header
- extractor_params = {
- 'queue': to_extract,
- 'base_dir': restore_tmpdir,
- 'passphrase': passphrase,
- 'encrypted': encrypted,
- 'compressed': compressed,
- 'crypto_algorithm': crypto_algorithm,
- 'verify_only': verify_only,
- 'total_size': vms_size,
- 'print_callback': print_callback,
- 'error_callback': error_callback,
- 'progress_callback': progress_callback,
- }
- if format_version == 2:
- extract_proc = ExtractWorker2(**extractor_params)
- elif format_version == 3:
- extractor_params['compression_filter'] = compression_filter
- extract_proc = ExtractWorker3(**extractor_params)
- else:
- raise NotImplemented("Backup format version %d not supported" % format_version)
- extract_proc.start()
- try:
- filename = None
- while True:
- if running_backup_operation and running_backup_operation.canceled:
- break
- if not extract_proc.is_alive():
- command.terminate()
- command.wait()
- expect_tar_error = True
- if vmproc:
- vmproc.terminate()
- vmproc.wait()
- vmproc = None
- break
- if nextfile is not None:
- filename = nextfile
- else:
- filename = filelist_pipe.readline().strip()
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Getting new file:"+filename)
- if not filename or filename=="EOF":
- break
- hmacfile = filelist_pipe.readline().strip()
- if running_backup_operation and running_backup_operation.canceled:
- break
- # if reading archive directly with tar, wait for next filename -
- # tar prints filename before processing it, so wait for the next one to be
- # sure that whole file was extracted
- if not appvm:
- nextfile = filelist_pipe.readline().strip()
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Getting hmac:"+hmacfile)
- if not hmacfile or hmacfile=="EOF":
- # Premature end of archive, either of tar1_command or vmproc exited with error
- break
- if not any(map(lambda x: filename.startswith(x), vms_dirs)):
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Ignoring VM not selected for restore")
- os.unlink(os.path.join(restore_tmpdir, filename))
- os.unlink(os.path.join(restore_tmpdir, hmacfile))
- continue
- if verify_hmac(os.path.join(restore_tmpdir,filename),
- os.path.join(restore_tmpdir,hmacfile),
- passphrase, hmac_algorithm):
- to_extract.put(os.path.join(restore_tmpdir, filename))
- if running_backup_operation and running_backup_operation.canceled:
- raise BackupCanceledError("Restore canceled",
- tmpdir=restore_tmpdir)
- if command.wait() != 0 and not expect_tar_error:
- raise QubesException(
- "unable to read the qubes backup file {0} ({1}). " \
- "Is it really a backup?".format(backup_source, command.wait()))
- if vmproc:
- if vmproc.wait() != 0:
- raise QubesException(
- "unable to read the qubes backup {0} " \
- "because of a VM error: {1}".format(
- backup_source, vmproc.stderr.read(MAX_STDERR_BYTES)))
- if filename and filename!="EOF":
- raise QubesException("Premature end of archive, the last file was %s" % filename)
- except:
- to_extract.put("ERROR")
- extract_proc.join()
- raise
- else:
- to_extract.put("FINISHED")
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Waiting for the extraction process to finish...")
- extract_proc.join()
- if BACKUP_DEBUG and callable(print_callback):
- print_callback("Extraction process finished with code:" + \
- str(extract_proc.exitcode))
- if extract_proc.exitcode != 0:
- raise QubesException(
- "unable to extract the qubes backup. " \
- "Check extracting process errors.")
- return header_data
- def backup_restore_set_defaults(options):
- if 'use-default-netvm' not in options:
- options['use-default-netvm'] = False
- if 'use-none-netvm' not in options:
- options['use-none-netvm'] = False
- if 'use-default-template' not in options:
- options['use-default-template'] = False
- if 'dom0-home' not in options:
- options['dom0-home'] = True
- if 'replace-template' not in options:
- options['replace-template'] = []
- if 'ignore-username-mismatch' not in options:
- options['ignore-username-mismatch'] = False
- if 'verify-only' not in options:
- options['verify-only'] = False
- return options
- def load_hmac(hmac):
- hmac = hmac.strip().split("=")
- if len(hmac) > 1:
- hmac = hmac[1].strip()
- else:
- raise QubesException("ERROR: invalid hmac file content")
- return hmac
- def backup_detect_format_version(backup_location):
- if os.path.exists(os.path.join(backup_location, 'qubes.xml')):
- return 1
- else:
- # this could mean also 3, but not distinguishable until backup header
- # is read
- return 2
- def backup_restore_header(source, passphrase,
- print_callback = print_stdout, error_callback = print_stderr,
- encrypted=False, appvm=None, compressed = False, format_version = None,
- hmac_algorithm = DEFAULT_HMAC_ALGORITHM,
- crypto_algorithm = DEFAULT_CRYPTO_ALGORITHM):
- global running_backup_operation
- vmproc = None
- running_backup_operation = None
- restore_tmpdir = tempfile.mkdtemp(prefix="/var/tmp/restore_")
- if format_version == None:
- format_version = backup_detect_format_version(source)
- if format_version == 1:
- return (restore_tmpdir, os.path.join(source, 'qubes.xml'), None)
- # tar2qfile matches only beginnings, while tar full path
- if appvm:
- extract_filter = [HEADER_FILENAME, 'qubes.xml.000']
- else:
- extract_filter = [HEADER_FILENAME, HEADER_FILENAME+'.hmac',
- 'qubes.xml.000', 'qubes.xml.000.hmac']
- header_data = restore_vm_dirs (source,
- restore_tmpdir,
- passphrase=passphrase,
- vms_dirs=extract_filter,
- vms=None,
- vms_size=HEADER_QUBES_XML_MAX_SIZE,
- format_version=format_version,
- hmac_algorithm=hmac_algorithm,
- crypto_algorithm=crypto_algorithm,
- print_callback=print_callback,
- error_callback=error_callback,
- progress_callback=None,
- encrypted=encrypted,
- compressed=compressed,
- appvm=appvm)
- return (restore_tmpdir, os.path.join(restore_tmpdir, "qubes.xml"),
- header_data)
- def restore_info_verify(restore_info, host_collection):
- options = restore_info['$OPTIONS$']
- for vm in restore_info.keys():
- if vm in ['$OPTIONS$', 'dom0']:
- continue
- vm_info = restore_info[vm]
- vm_info.pop('excluded', None)
- if 'exclude' in options.keys():
- if vm in options['exclude']:
- vm_info['excluded'] = True
- vm_info.pop('already-exists', None)
- if not options['verify-only'] and \
- host_collection.get_vm_by_name (vm) is not None:
- vm_info['already-exists'] = True
- # check template
- vm_info.pop('missing-template', None)
- if vm_info['template']:
- template_name = vm_info['template']
- host_template = host_collection.get_vm_by_name(template_name)
- if not host_template or not host_template.is_template():
- # Maybe the (custom) template is in the backup?
- if not (template_name in restore_info.keys() and
- restore_info[template_name]['vm'].is_template()):
- if options['use-default-template']:
- if 'orig-template' not in vm_info.keys():
- vm_info['orig-template'] = template_name
- vm_info['template'] = host_collection\
- .get_default_template().name
- else:
- vm_info['missing-template'] = True
- # check netvm
- vm_info.pop('missing-netvm', None)
- if vm_info['netvm']:
- netvm_name = vm_info['netvm']
- netvm_on_host = host_collection.get_vm_by_name (netvm_name)
- # No netvm on the host?
- if not ((netvm_on_host is not None) and netvm_on_host.is_netvm()):
- # Maybe the (custom) netvm is in the backup?
- if not (netvm_name in restore_info.keys() and \
- restore_info[netvm_name]['vm'].is_netvm()):
- if options['use-default-netvm']:
- vm_info['netvm'] = host_collection\
- .get_default_netvm().name
- vm_info['vm'].uses_default_netvm = True
- elif options['use-none-netvm']:
- vm_info['netvm'] = None
- else:
- vm_info['missing-netvm'] = True
- vm_info['good-to-go'] = not any([(prop in vm_info.keys()) for
- prop in ['missing-netvm',
- 'missing-template',
- 'already-exists',
- 'excluded']])
- return restore_info
- def backup_restore_prepare(backup_location, passphrase, options = None,
- host_collection = None, encrypted=False, appvm=None,
- compressed = False, print_callback = print_stdout, error_callback = print_stderr,
- format_version=None, hmac_algorithm=DEFAULT_HMAC_ALGORITHM,
- crypto_algorithm=DEFAULT_CRYPTO_ALGORITHM):
- if options is None:
- options = {}
- # Defaults
- backup_restore_set_defaults(options)
- # Options introduced in backup format 3+, which always have a header,
- # so no need for fallback in function parameter
- compression_filter = DEFAULT_COMPRESSION_FILTER
- #### Private functions begin
- def is_vm_included_in_backup_v1 (backup_dir, vm):
- if vm.qid == 0:
- return os.path.exists(os.path.join(backup_dir,'dom0-home'))
- backup_vm_dir_path = vm.dir_path.replace (system_path["qubes_base_dir"], backup_dir)
- if os.path.exists (backup_vm_dir_path):
- return True
- else:
- return False
- def is_vm_included_in_backup_v2 (backup_dir, vm):
- if vm.backup_content:
- return True
- else:
- return False
- def find_template_name(template, replaces):
- rx_replace = re.compile("(.*):(.*)")
- for r in replaces:
- m = rx_replace.match(r)
- if m.group(1) == template:
- return m.group(2)
- return template
- #### Private functions end
- # Format versions:
- # 1 - Qubes R1, Qubes R2 beta1, beta2
- # 2 - Qubes R2 beta3+
- if format_version is None:
- format_version = backup_detect_format_version(backup_location)
- if format_version == 1:
- is_vm_included_in_backup = is_vm_included_in_backup_v1
- elif format_version in [2, 3]:
- is_vm_included_in_backup = is_vm_included_in_backup_v2
- if not appvm:
- if not os.path.isfile(backup_location):
- raise QubesException("Invalid backup location (not a file or "
- "directory with qubes.xml)"
- ": %s" % unicode(
- backup_location))
- else:
- raise QubesException("Unknown backup format version: %s" % str(format_version))
- (restore_tmpdir, qubes_xml, header_data) = backup_restore_header(
- backup_location,
- passphrase,
- encrypted=encrypted,
- appvm=appvm,
- compressed=compressed,
- hmac_algorithm=hmac_algorithm,
- crypto_algorithm=crypto_algorithm,
- print_callback=print_callback,
- error_callback=error_callback,
- format_version=format_version)
- if header_data:
- if BackupHeader.version in header_data:
- format_version = header_data[BackupHeader.version]
- if BackupHeader.crypto_algorithm in header_data:
- crypto_algorithm = header_data[BackupHeader.crypto_algorithm]
- if BackupHeader.hmac_algorithm in header_data:
- hmac_algorithm = header_data[BackupHeader.hmac_algorithm]
- if BackupHeader.compressed in header_data:
- compressed = header_data[BackupHeader.compressed]
- if BackupHeader.encrypted in header_data:
- encrypted = header_data[BackupHeader.encrypted]
- if BackupHeader.compression_filter in header_data:
- compression_filter = header_data[BackupHeader.compression_filter]
- if BACKUP_DEBUG:
- print "Loading file", qubes_xml
- backup_collection = QubesVmCollection(store_filename = qubes_xml)
- backup_collection.lock_db_for_reading()
- backup_collection.load()
- if host_collection is None:
- host_collection = QubesVmCollection()
- host_collection.lock_db_for_reading()
- host_collection.load()
- host_collection.unlock_db()
- backup_vms_list = [vm for vm in backup_collection.values()]
- vms_to_restore = {}
- # ... and the actual data
- for vm in backup_vms_list:
- if vm.qid == 0:
- # Handle dom0 as special case later
- continue
- if is_vm_included_in_backup (backup_location, vm):
- if BACKUP_DEBUG:
- print vm.name,"is included in backup"
- vms_to_restore[vm.name] = {}
- vms_to_restore[vm.name]['vm'] = vm
- if vm.template is None:
- vms_to_restore[vm.name]['template'] = None
- else:
- templatevm_name = find_template_name(vm.template.name, options['replace-template'])
- vms_to_restore[vm.name]['template'] = templatevm_name
- if vm.netvm is None:
- vms_to_restore[vm.name]['netvm'] = None
- else:
- netvm_name = vm.netvm.name
- vms_to_restore[vm.name]['netvm'] = netvm_name
- # Set to None to not confuse QubesVm object from backup
- # collection with host collection (further in clone_attrs). Set
- # directly _netvm to suppress setter action, especially
- # modifying firewall
- vm._netvm = None
- # Store restore parameters
- options['location'] = backup_location
- options['restore_tmpdir'] = restore_tmpdir
- options['passphrase'] = passphrase
- options['encrypted'] = encrypted
- options['compressed'] = compressed
- options['compression_filter'] = compression_filter
- options['hmac_algorithm'] = hmac_algorithm
- options['crypto_algorithm'] = crypto_algorithm
- options['appvm'] = appvm
- options['format_version'] = format_version
- vms_to_restore['$OPTIONS$'] = options
- vms_to_restore = restore_info_verify(vms_to_restore, host_collection)
- # ...and dom0 home
- if options['dom0-home'] and \
- is_vm_included_in_backup(backup_location, backup_collection[0]):
- vm = backup_collection[0]
- vms_to_restore['dom0'] = {}
- if format_version == 1:
- vms_to_restore['dom0']['subdir'] = \
- os.listdir(os.path.join(backup_location, 'dom0-home'))[0]
- vms_to_restore['dom0']['size'] = 0 # unknown
- else:
- vms_to_restore['dom0']['subdir'] = vm.backup_path
- vms_to_restore['dom0']['size'] = vm.backup_size
- local_user = grp.getgrnam('qubes').gr_mem[0]
- dom0_home = vms_to_restore['dom0']['subdir']
- vms_to_restore['dom0']['username'] = os.path.basename(dom0_home)
- if vms_to_restore['dom0']['username'] != local_user:
- vms_to_restore['dom0']['username-mismatch'] = True
- if options['ignore-username-mismatch']:
- vms_to_restore['dom0']['ignore-username-mismatch'] = True
- else:
- vms_to_restore['dom0']['good-to-go'] = False
- if 'good-to-go' not in vms_to_restore['dom0']:
- vms_to_restore['dom0']['good-to-go'] = True
- # Not needed - all the data stored in vms_to_restore
- if format_version >= 2:
- os.unlink(qubes_xml)
- return vms_to_restore
- def backup_restore_print_summary(restore_info, print_callback = print_stdout):
- fields = {
- "qid": {"func": "vm.qid"},
- "name": {"func": "('[' if vm.is_template() else '')\
- + ('{' if vm.is_netvm() else '')\
- + vm.name \
- + (']' if vm.is_template() else '')\
- + ('}' if vm.is_netvm() else '')"},
- "type": {"func": "'Tpl' if vm.is_template() else \
- 'HVM' if vm.type == 'HVM' else \
- vm.type.replace('VM','')"},
- "updbl" : {"func": "'Yes' if vm.updateable else ''"},
- "template": {"func": "'n/a' if vm.is_template() or vm.template is None else\
- vm_info['template']"},
- "netvm": {"func": "'n/a' if vm.is_netvm() and not vm.is_proxyvm() else\
- ('*' if vm.uses_default_netvm else '') +\
- vm_info['netvm'] if vm_info['netvm'] is not None else '-'"},
- "label" : {"func" : "vm.label.name"},
- }
- fields_to_display = ["name", "type", "template", "updbl", "netvm", "label" ]
- # First calculate the maximum width of each field we want to display
- total_width = 0
- for f in fields_to_display:
- fields[f]["max_width"] = len(f)
- for vm_info in restore_info.values():
- if 'vm' in vm_info.keys():
- vm = vm_info['vm']
- l = len(unicode(eval(fields[f]["func"])))
- if l > fields[f]["max_width"]:
- fields[f]["max_width"] = l
- total_width += fields[f]["max_width"]
- print_callback("")
- print_callback("The following VMs are included in the backup:")
- print_callback("")
- # Display the header
- s = ""
- for f in fields_to_display:
- fmt="{{0:-^{0}}}-+".format(fields[f]["max_width"] + 1)
- s += fmt.format('-')
- print_callback(s)
- s = ""
- for f in fields_to_display:
- fmt="{{0:>{0}}} |".format(fields[f]["max_width"] + 1)
- s += fmt.format(f)
- print_callback(s)
- s = ""
- for f in fields_to_display:
- fmt="{{0:-^{0}}}-+".format(fields[f]["max_width"] + 1)
- s += fmt.format('-')
- print_callback(s)
- for vm_info in restore_info.values():
- # Skip non-VM here
- if not 'vm' in vm_info:
- continue
- vm = vm_info['vm']
- s = ""
- for f in fields_to_display:
- fmt="{{0:>{0}}} |".format(fields[f]["max_width"] + 1)
- s += fmt.format(eval(fields[f]["func"]))
- if 'excluded' in vm_info and vm_info['excluded']:
- s += " <-- Excluded from restore"
- elif 'already-exists' in vm_info:
- s += " <-- A VM with the same name already exists on the host!"
- elif 'missing-template' in vm_info:
- s += " <-- No matching template on the host or in the backup found!"
- elif 'missing-netvm' in vm_info:
- s += " <-- No matching netvm on the host or in the backup found!"
- elif 'orig-template' in vm_info:
- s += " <-- Original template was '%s'" % (vm_info['orig-template'])
- print_callback(s)
- if 'dom0' in restore_info.keys():
- s = ""
- for f in fields_to_display:
- fmt="{{0:>{0}}} |".format(fields[f]["max_width"] + 1)
- if f == "name":
- s += fmt.format("Dom0")
- elif f == "type":
- s += fmt.format("Home")
- else:
- s += fmt.format("")
- if 'username-mismatch' in restore_info['dom0']:
- s += " <-- username in backup and dom0 mismatch"
- if 'ignore-username-mismatch' in restore_info['dom0']:
- s += " (ignored)"
- print_callback(s)
- def backup_restore_do(restore_info,
- host_collection = None, print_callback = print_stdout,
- error_callback = print_stderr, progress_callback = None,
- ):
- global running_backup_operation
- ### Private functions begin
- def restore_vm_dir_v1 (backup_dir, src_dir, dst_dir):
- backup_src_dir = src_dir.replace (system_path["qubes_base_dir"], backup_dir)
- # We prefer to use Linux's cp, because it nicely handles sparse files
- retcode = subprocess.call (["cp", "-rp", backup_src_dir, dst_dir])
- if retcode != 0:
- raise QubesException(
- "*** Error while copying file {0} to {1}".format(backup_src_dir,
- dst_dir))
- ### Private functions end
- options = restore_info['$OPTIONS$']
- backup_location = options['location']
- restore_tmpdir = options['restore_tmpdir']
- passphrase = options['passphrase']
- encrypted = options['encrypted']
- compressed = options['compressed']
- compression_filter = options['compression_filter']
- hmac_algorithm = options['hmac_algorithm']
- crypto_algorithm = options['crypto_algorithm']
- verify_only = options['verify-only']
- appvm = options['appvm']
- format_version = options['format_version']
- if format_version is None:
- format_version = backup_detect_format_version(backup_location)
- lock_obtained = False
- if host_collection is None:
- host_collection = QubesVmCollection()
- host_collection.lock_db_for_writing()
- host_collection.load()
- lock_obtained = True
- # Perform VM restoration in backup order
- vms_dirs = []
- vms_size = 0
- vms = {}
- for vm_info in restore_info.values():
- if 'vm' not in vm_info:
- continue
- if not vm_info['good-to-go']:
- continue
- vm = vm_info['vm']
- if format_version >= 2:
- vms_size += vm.backup_size
- vms_dirs.append(vm.backup_path)
- vms[vm.name] = vm
- running_backup_operation = BackupOperationInfo()
- if format_version >= 2:
- if 'dom0' in restore_info.keys() and restore_info['dom0']['good-to-go']:
- vms_dirs.append(os.path.dirname(restore_info['dom0']['subdir']))
- vms_size += restore_info['dom0']['size']
- try:
- restore_vm_dirs (backup_location,
- restore_tmpdir,
- passphrase=passphrase,
- vms_dirs=vms_dirs,
- vms=vms,
- vms_size=vms_size,
- format_version=format_version,
- hmac_algorithm=hmac_algorithm,
- crypto_algorithm=crypto_algorithm,
- verify_only=verify_only,
- print_callback=print_callback,
- error_callback=error_callback,
- progress_callback=progress_callback,
- encrypted=encrypted,
- compressed=compressed,
- compression_filter=compression_filter,
- appvm=appvm)
- except QubesException as e:
- if verify_only:
- raise
- else:
- if callable(print_callback):
- print_callback("Some errors occurred during data extraction, "
- "continuing anyway to restore at least some "
- "VMs")
- else:
- if verify_only:
- if callable(print_callback):
- print_callback("WARNING: Backup verification not supported for "
- "this backup format.")
- if verify_only:
- shutil.rmtree(restore_tmpdir)
- return
- # Add VM in right order
- for (vm_class_name, vm_class) in sorted(QubesVmClasses.items(),
- key=lambda _x: _x[1].load_order):
- if running_backup_operation.canceled:
- break
- for vm in vms.values():
- if running_backup_operation.canceled:
- # only break the loop to save qubes.xml with already restored
- # VMs
- break
- if not vm.__class__ == vm_class:
- continue
- if callable(print_callback):
- print_callback("-> Restoring {type} {0}...".format(vm.name, type=vm_class_name))
- retcode = subprocess.call (["mkdir", "-p", os.path.dirname(vm.dir_path)])
- if retcode != 0:
- error_callback("*** Cannot create directory: {0}?!".format(
- vm.dir_path))
- error_callback("Skipping...")
- continue
- template = None
- if vm.template is not None:
- template_name = restore_info[vm.name]['template']
- template = host_collection.get_vm_by_name(template_name)
- new_vm = None
- try:
- new_vm = host_collection.add_new_vm(vm_class_name, name=vm.name,
- conf_file=vm.conf_file,
- dir_path=vm.dir_path,
- template=template,
- installed_by_rpm=False)
- if format_version == 1:
- restore_vm_dir_v1(backup_location,
- vm.dir_path,
- os.path.dirname(new_vm.dir_path))
- elif format_version >= 2:
- shutil.move(os.path.join(restore_tmpdir, vm.backup_path),
- new_vm.dir_path)
- new_vm.verify_files()
- except Exception as err:
- error_callback("ERROR: {0}".format(err))
- error_callback("*** Skipping VM: {0}".format(vm.name))
- if new_vm:
- host_collection.pop(new_vm.qid)
- continue
- # FIXME: cannot check for 'kernel' property, because it is always
- # defined - accessing it touches non-existent '_kernel'
- if not isinstance(vm, QubesVmClasses['QubesHVm']):
- # TODO: add a setting for this?
- if vm.kernel and vm.kernel not in os.listdir(system_path[
- 'qubes_kernels_base_dir']):
- if callable(print_callback):
- print_callback("WARNING: Kernel %s not installed, "
- "using default one" % vm.kernel)
- vm.uses_default_kernel = True
- vm.kernel = host_collection.get_default_kernel()
- try:
- new_vm.clone_attrs(vm)
- except Exception as err:
- error_callback("ERROR: {0}".format(err))
- error_callback("*** Some VM property will not be restored")
- try:
- new_vm.appmenus_create(verbose=callable(print_callback))
- except Exception as err:
- error_callback("ERROR during appmenu restore: {0}".format(err))
- error_callback("*** VM '{0}' will not have appmenus".format(vm.name))
- # Set network dependencies - only non-default netvm setting
- for vm in vms.values():
- host_vm = host_collection.get_vm_by_name(vm.name)
- if host_vm is None:
- # Failed/skipped VM
- continue
- if not vm.uses_default_netvm:
- if restore_info[vm.name]['netvm'] is not None:
- host_vm.netvm = host_collection.get_vm_by_name (
- restore_info[vm.name]['netvm'])
- else:
- host_vm.netvm = None
- host_collection.save()
- if lock_obtained:
- host_collection.unlock_db()
- if running_backup_operation.canceled:
- if format_version >= 2:
- raise BackupCanceledError("Restore canceled",
- tmpdir=restore_tmpdir)
- else:
- raise BackupCanceledError("Restore canceled")
- # ... and dom0 home as last step
- if 'dom0' in restore_info.keys() and restore_info['dom0']['good-to-go']:
- backup_path = restore_info['dom0']['subdir']
- local_user = grp.getgrnam('qubes').gr_mem[0]
- home_dir = pwd.getpwnam(local_user).pw_dir
- if format_version == 1:
- backup_dom0_home_dir = os.path.join(backup_location, backup_path)
- else:
- backup_dom0_home_dir = os.path.join(restore_tmpdir, backup_path)
- restore_home_backupdir = "home-pre-restore-{0}".format (time.strftime("%Y-%m-%d-%H%M%S"))
- if callable(print_callback):
- print_callback("-> Restoring home of user '{0}'...".format(local_user))
- print_callback("--> Existing files/dirs backed up in '{0}' dir".format(restore_home_backupdir))
- os.mkdir(home_dir + '/' + restore_home_backupdir)
- for f in os.listdir(backup_dom0_home_dir):
- home_file = home_dir + '/' + f
- if os.path.exists(home_file):
- os.rename(home_file, home_dir + '/' + restore_home_backupdir + '/' + f)
- if format_version == 1:
- retcode = subprocess.call (["cp", "-nrp", backup_dom0_home_dir + '/' + f, home_file])
- elif format_version >= 2:
- shutil.move(backup_dom0_home_dir + '/' + f, home_file)
- retcode = subprocess.call(['sudo', 'chown', '-R', local_user, home_dir])
- if retcode != 0:
- error_callback("*** Error while setting home directory owner")
- shutil.rmtree(restore_tmpdir)
- # vim:sw=4:et:
|