123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984 |
- #!/usr/bin/python2 -O
- # vim: fileencoding=utf-8
- # pylint: disable=invalid-name
- #
- # The Qubes OS Project, https://www.qubes-os.org/
- #
- # Copyright (C) 2014-2015 Joanna Rutkowska <joanna@invisiblethingslab.com>
- # Copyright (C) 2014-2015
- # Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
- # Copyright (C) 2014-2015 Wojtek Porczyk <woju@invisiblethingslab.com>
- #
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation; either version 2 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License along
- # with this program; if not, write to the Free Software Foundation, Inc.,
- # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- #
- """
- .. warning::
- The test suite hereby claims any domain whose name starts with
- :py:data:`VMPREFIX` as fair game. This is needed to enforce sane
- test executing environment. If you have domains named ``test-*``,
- don't run the tests.
- """
- import collections
- from distutils import spawn
- import functools
- import multiprocessing
- import logging
- import os
- import shutil
- import subprocess
- import sys
- import tempfile
- import traceback
- import unittest
- import lxml.etree
- import time
- import qubes.config
- import qubes.events
- import qubes.backup
- import qubes.exc
- import qubes.vm.standalonevm
- XMLPATH = '/var/lib/qubes/qubes-test.xml'
- CLASS_XMLPATH = '/var/lib/qubes/qubes-class-test.xml'
- TEMPLATE = 'fedora-23'
- VMPREFIX = 'test-inst-'
- CLSVMPREFIX = 'test-cls-'
- #: :py:obj:`True` if running in dom0, :py:obj:`False` otherwise
- in_dom0 = False
- #: :py:obj:`False` if outside of git repo,
- #: path to root of the directory otherwise
- in_git = False
- try:
- import libvirt
- libvirt.openReadOnly(qubes.config.defaults['libvirt_uri']).close()
- in_dom0 = True
- except libvirt.libvirtError:
- pass
- try:
- in_git = subprocess.check_output(
- ['git', 'rev-parse', '--show-toplevel']).strip()
- qubes.log.LOGPATH = '/tmp'
- qubes.log.LOGFILE = '/tmp/qubes.log'
- except subprocess.CalledProcessError:
- # git returned nonzero, we are outside git repo
- pass
- except OSError:
- # command not found; let's assume we're outside
- pass
- def skipUnlessDom0(test_item):
- '''Decorator that skips test outside dom0.
- Some tests (especially integration tests) have to be run in more or less
- working dom0. This is checked by connecting to libvirt.
- '''
- return unittest.skipUnless(in_dom0, 'outside dom0')(test_item)
- def skipUnlessGit(test_item):
- '''Decorator that skips test outside git repo.
- There are very few tests that an be run only in git. One example is
- correctness of example code that won't get included in RPM.
- '''
- return unittest.skipUnless(in_git, 'outside git tree')(test_item)
- class TestEmitter(qubes.events.Emitter):
- '''Dummy event emitter which records events fired on it.
- Events are counted in :py:attr:`fired_events` attribute, which is
- :py:class:`collections.Counter` instance. For each event, ``(event, args,
- kwargs)`` object is counted. *event* is event name (a string), *args* is
- tuple with positional arguments and *kwargs* is sorted tuple of items from
- keyword arguments.
- >>> emitter = TestEmitter()
- >>> emitter.fired_events
- Counter()
- >>> emitter.fire_event('event', 1, 2, 3, spam='eggs', foo='bar')
- >>> emitter.fired_events
- Counter({('event', (1, 2, 3), (('foo', 'bar'), ('spam', 'eggs'))): 1})
- '''
- def __init__(self, *args, **kwargs):
- super(TestEmitter, self).__init__(*args, **kwargs)
- #: :py:class:`collections.Counter` instance
- self.fired_events = collections.Counter()
- def fire_event(self, event, *args, **kwargs):
- super(TestEmitter, self).fire_event(event, *args, **kwargs)
- self.fired_events[(event, args, tuple(sorted(kwargs.items())))] += 1
- def fire_event_pre(self, event, *args, **kwargs):
- super(TestEmitter, self).fire_event_pre(event, *args, **kwargs)
- self.fired_events[(event, args, tuple(sorted(kwargs.items())))] += 1
- def expectedFailureIfTemplate(templates):
- """
- Decorator for marking specific test as expected to fail only for some
- templates. Template name is compared as substring, so 'whonix' will
- handle both 'whonix-ws' and 'whonix-gw'.
- templates can be either a single string, or an iterable
- """
- def decorator(func):
- @functools.wraps(func)
- def wrapper(self, *args, **kwargs):
- template = self.template
- if isinstance(templates, basestring):
- should_expect_fail = template in templates
- else:
- should_expect_fail = any([template in x for x in templates])
- if should_expect_fail:
- try:
- func(self, *args, **kwargs)
- except Exception:
- raise unittest.case._ExpectedFailure(sys.exc_info())
- raise unittest.case._UnexpectedSuccess()
- else:
- # Call directly:
- func(self, *args, **kwargs)
- return wrapper
- return decorator
- class _AssertNotRaisesContext(object):
- """A context manager used to implement TestCase.assertNotRaises methods.
- Stolen from unittest and hacked. Regexp support stripped.
- """ # pylint: disable=too-few-public-methods
- def __init__(self, expected, test_case, expected_regexp=None):
- if expected_regexp is not None:
- raise NotImplementedError('expected_regexp is unsupported')
- self.expected = expected
- self.exception = None
- self.failureException = test_case.failureException
- def __enter__(self):
- return self
- def __exit__(self, exc_type, exc_value, tb):
- if exc_type is None:
- return True
- if issubclass(exc_type, self.expected):
- raise self.failureException(
- "{!r} raised, traceback:\n{!s}".format(
- exc_value, ''.join(traceback.format_tb(tb))))
- else:
- # pass through
- return False
- self.exception = exc_value # store for later retrieval
- class BeforeCleanExit(BaseException):
- '''Raised from :py:meth:`QubesTestCase.tearDown` when
- :py:attr:`qubes.tests.run.QubesDNCTestResult.do_not_clean` is set.'''
- pass
- class QubesTestCase(unittest.TestCase):
- '''Base class for Qubes unit tests.
- '''
- def __init__(self, *args, **kwargs):
- super(QubesTestCase, self).__init__(*args, **kwargs)
- self.longMessage = True
- self.log = logging.getLogger('{}.{}.{}'.format(
- self.__class__.__module__,
- self.__class__.__name__,
- self._testMethodName))
- def __str__(self):
- return '{}/{}/{}'.format(
- self.__class__.__module__,
- self.__class__.__name__,
- self._testMethodName)
- def tearDown(self):
- super(QubesTestCase, self).tearDown()
- result = self._resultForDoCleanups
- failed_test_cases = result.failures \
- + result.errors \
- + [(tc, None) for tc in result.unexpectedSuccesses]
- if getattr(result, 'do_not_clean', False) \
- and any(tc is self for tc, exc in failed_test_cases):
- raise BeforeCleanExit()
- def assertNotRaises(self, excClass, callableObj=None, *args, **kwargs):
- """Fail if an exception of class excClass is raised
- by callableObj when invoked with arguments args and keyword
- arguments kwargs. If a different type of exception is
- raised, it will not be caught, and the test case will be
- deemed to have suffered an error, exactly as for an
- unexpected exception.
- If called with callableObj omitted or None, will return a
- context object used like this::
- with self.assertRaises(SomeException):
- do_something()
- The context manager keeps a reference to the exception as
- the 'exception' attribute. This allows you to inspect the
- exception after the assertion::
- with self.assertRaises(SomeException) as cm:
- do_something()
- the_exception = cm.exception
- self.assertEqual(the_exception.error_code, 3)
- """
- context = _AssertNotRaisesContext(excClass, self)
- if callableObj is None:
- return context
- with context:
- callableObj(*args, **kwargs)
- def assertXMLEqual(self, xml1, xml2):
- '''Check for equality of two XML objects.
- :param xml1: first element
- :param xml2: second element
- :type xml1: :py:class:`lxml.etree._Element`
- :type xml2: :py:class:`lxml.etree._Element`
- ''' # pylint: disable=invalid-name
- self.assertEqual(xml1.tag, xml2.tag)
- self.assertEqual(xml1.text, xml2.text)
- self.assertItemsEqual(xml1.keys(), xml2.keys())
- for key in xml1.keys():
- self.assertEqual(xml1.get(key), xml2.get(key))
- def assertEventFired(self, emitter, event, args=None, kwargs=None):
- '''Check whether event was fired on given emitter and fail if it did
- not.
- :param emitter: emitter which is being checked
- :type emitter: :py:class:`TestEmitter`
- :param str event: event identifier
- :param list args: when given, all items must appear in args passed to \
- an event
- :param list kwargs: when given, all items must appear in kwargs passed \
- to an event
- '''
- for ev, ev_args, ev_kwargs in emitter.fired_events:
- if ev != event:
- continue
- if args is not None and any(i not in ev_args for i in args):
- continue
- if kwargs is not None and any(i not in ev_kwargs for i in kwargs):
- continue
- return
- self.fail('event {!r} did not fire on {!r}'.format(event, emitter))
- def assertEventNotFired(self, emitter, event, args=None, kwargs=None):
- '''Check whether event was fired on given emitter. Fail if it did.
- :param emitter: emitter which is being checked
- :type emitter: :py:class:`TestEmitter`
- :param str event: event identifier
- :param list args: when given, all items must appear in args passed to \
- an event
- :param list kwargs: when given, all items must appear in kwargs passed \
- to an event
- '''
- for ev, ev_args, ev_kwargs in emitter.fired_events:
- if ev != event:
- continue
- if args is not None and any(i not in ev_args for i in args):
- continue
- if kwargs is not None and any(i not in ev_kwargs for i in kwargs):
- continue
- self.fail('event {!r} did fire on {!r}'.format(event, emitter))
- return
- def assertXMLIsValid(self, xml, file=None, schema=None):
- '''Check whether given XML fulfills Relax NG schema.
- Schema can be given in a couple of ways:
- - As separate file. This is most common, and also the only way to
- handle file inclusion. Call with file name as second argument.
- - As string containing actual schema. Put that string in *schema*
- keyword argument.
- :param lxml.etree._Element xml: XML element instance to check
- :param str file: filename of Relax NG schema
- :param str schema: optional explicit schema string
- ''' # pylint: disable=redefined-builtin
- if schema is not None and file is None:
- relaxng = schema
- if isinstance(relaxng, str):
- relaxng = lxml.etree.XML(relaxng)
- # pylint: disable=protected-access
- if isinstance(relaxng, lxml.etree._Element):
- relaxng = lxml.etree.RelaxNG(relaxng)
- elif file is not None and schema is None:
- if not os.path.isabs(file):
- basedirs = ['/usr/share/doc/qubes/relaxng']
- if in_git:
- basedirs.insert(0, os.path.join(in_git, 'relaxng'))
- for basedir in basedirs:
- abspath = os.path.join(basedir, file)
- if os.path.exists(abspath):
- file = abspath
- break
- relaxng = lxml.etree.RelaxNG(file=file)
- else:
- raise TypeError("There should be excactly one of 'file' and "
- "'schema' arguments specified.")
- # We have to be extra careful here in case someone messed up with
- # self.failureException. It should by default be AssertionError, just
- # what is spewed by RelaxNG(), but who knows what might happen.
- try:
- relaxng.assert_(xml)
- except self.failureException:
- raise
- except AssertionError as e:
- self.fail(str(e))
- @staticmethod
- def make_vm_name(name, class_teardown=False):
- if class_teardown:
- return CLSVMPREFIX + name
- else:
- return VMPREFIX + name
- class SystemTestsMixin(object):
- """
- Mixin for integration tests. All the tests here should use self.app
- object and when need qubes.xml path - should use :py:data:`XMLPATH`
- defined in this file.
- Every VM created by test, must use :py:meth:`SystemTestsMixin.make_vm_name`
- for VM name.
- By default self.app represents empty collection, if anything is needed
- there from the real collection it can be imported from self.host_app in
- :py:meth:`SystemTestsMixin.setUp`. But *can not be modified* in any way -
- this include both changing attributes in
- :py:attr:`SystemTestsMixin.host_app` and modifying files of such imported
- VM. If test need to make some modification, it must clone the VM first.
- If some group of tests needs class-wide initialization, first of all the
- author should consider if it is really needed. But if so, setUpClass can
- be used to create Qubes(CLASS_XMLPATH) object and create/import required
- stuff there. VMs created in :py:meth:`TestCase.setUpClass` should
- use self.make_vm_name('...', class_teardown=True) for name creation.
- """
- # noinspection PyAttributeOutsideInit
- def setUp(self):
- if not in_dom0:
- self.skipTest('outside dom0')
- super(SystemTestsMixin, self).setUp()
- self.remove_test_vms()
- # need some information from the real qubes.xml - at least installed
- # templates; should not be used for testing, only to initialize self.app
- self.host_app = qubes.Qubes(os.path.join(
- qubes.config.system_path['qubes_base_dir'],
- qubes.config.system_path['qubes_store_filename']))
- if os.path.exists(CLASS_XMLPATH):
- shutil.copy(CLASS_XMLPATH, XMLPATH)
- self.app = qubes.Qubes(XMLPATH)
- else:
- self.app = qubes.Qubes.create_empty_store(qubes.tests.XMLPATH,
- default_kernel=self.host_app.default_kernel,
- clockvm=None,
- updatevm=None
- )
- os.environ['QUBES_XML_PATH'] = XMLPATH
- def init_default_template(self, template=None):
- if template is None:
- template = self.host_app.default_template
- elif isinstance(template, basestring):
- template = self.host_app.domains[template]
- template_vm = self.app.add_new_vm(qubes.vm.templatevm.TemplateVM,
- name=template.name,
- uuid=template.uuid,
- label='black')
- self.app.default_template = template_vm
- def init_networking(self):
- if not self.app.default_template:
- self.skipTest('Default template required for testing networking')
- default_netvm = self.host_app.default_netvm
- if default_netvm is None:
- self.skipTest('Default netvm required')
- if not default_netvm.is_running():
- self.skipTest('Default netvm required to be running')
- # Add NetVM stub to qubes-test.xml matching the one on host.
- # Keeping 'qid' the same is critical because IP addresses are
- # calculated from it.
- # Intentionally don't copy template (use default), as it may be based
- # on a different one than actually testing.
- netvm_clone = self.app.add_new_vm(default_netvm.__class__,
- qid=default_netvm.qid,
- name=default_netvm.name,
- uuid=default_netvm.uuid,
- label=default_netvm.label,
- provides_network=True
- )
- self.app.default_netvm = netvm_clone
- def reload_db(self):
- self.app = qubes.Qubes(qubes.tests.XMLPATH)
- def save_and_reload_db(self):
- self.app.save()
- self.reload_db()
- def tearDown(self):
- super(SystemTestsMixin, self).tearDown()
- self.remove_test_vms()
- # remove all references to VM objects, to release resources - most
- # importantly file descriptors; this object will live
- # during the whole test run, but all the file descriptors would be
- # depleted earlier
- del self.app
- del self.host_app
- for attr in dir(self):
- if isinstance(getattr(self, attr), qubes.vm.BaseVM):
- delattr(self, attr)
- @classmethod
- def tearDownClass(cls):
- super(SystemTestsMixin, cls).tearDownClass()
- if not in_dom0:
- return
- cls.remove_test_vms(xmlpath=CLASS_XMLPATH, prefix=CLSVMPREFIX)
- @classmethod
- def _remove_vm_qubes(cls, vm):
- vmname = vm.name
- app = vm.app
- try:
- # XXX .is_running() may throw libvirtError if undefined
- if vm.is_running():
- vm.force_shutdown()
- except: # pylint: disable=bare-except
- pass
- try:
- vm.remove_from_disk()
- except: # pylint: disable=bare-except
- pass
- try:
- vm.libvirt_domain.undefine()
- except (AttributeError, libvirt.libvirtError):
- pass
- del app.domains[vm.qid]
- del vm
- app.save()
- del app
- # Now ensure it really went away. This may not have happened,
- # for example if vm.libvirt_domain malfunctioned.
- try:
- conn = libvirt.open(qubes.config.defaults['libvirt_uri'])
- dom = conn.lookupByName(vmname)
- except: # pylint: disable=bare-except
- pass
- else:
- cls._remove_vm_libvirt(dom)
- cls._remove_vm_disk(vmname)
- @staticmethod
- def _remove_vm_libvirt(dom):
- try:
- dom.destroy()
- except libvirt.libvirtError: # not running
- pass
- dom.undefine()
- @staticmethod
- def _remove_vm_disk(vmname):
- for dirspec in (
- 'qubes_appvms_dir',
- 'qubes_servicevms_dir',
- 'qubes_templates_dir'):
- dirpath = os.path.join(qubes.config.system_path['qubes_base_dir'],
- qubes.config.system_path[dirspec], vmname)
- if os.path.exists(dirpath):
- if os.path.isdir(dirpath):
- shutil.rmtree(dirpath)
- else:
- os.unlink(dirpath)
- @classmethod
- def remove_vms(cls, vms):
- for vm in vms:
- cls._remove_vm_qubes(vm)
- @classmethod
- def remove_test_vms(cls, xmlpath=XMLPATH, prefix=VMPREFIX):
- '''Aggresively remove any domain that has name in testing namespace.
- '''
- # first, remove them Qubes-way
- if os.path.exists(xmlpath):
- try:
- cls.remove_vms(vm for vm in qubes.Qubes(xmlpath).domains
- if vm.name.startswith(prefix))
- except qubes.exc.QubesException:
- # If qubes-test.xml is broken that much it doesn't even load,
- # simply remove it. VMs will be cleaned up the hard way.
- # TODO logging?
- pass
- os.unlink(xmlpath)
- # now remove what was only in libvirt
- conn = libvirt.open(qubes.config.defaults['libvirt_uri'])
- for dom in conn.listAllDomains():
- if dom.name().startswith(prefix):
- cls._remove_vm_libvirt(dom)
- conn.close()
- # finally remove anything that is left on disk
- vmnames = set()
- for dirspec in (
- 'qubes_appvms_dir',
- 'qubes_servicevms_dir',
- 'qubes_templates_dir'):
- dirpath = os.path.join(qubes.config.system_path['qubes_base_dir'],
- qubes.config.system_path[dirspec])
- for name in os.listdir(dirpath):
- if name.startswith(prefix):
- vmnames.add(name)
- for vmname in vmnames:
- cls._remove_vm_disk(vmname)
- def qrexec_policy(self, service, source, destination, allow=True):
- """
- Allow qrexec calls for duration of the test
- :param service: service name
- :param source: source VM name
- :param destination: destination VM name
- :return:
- """
- def add_remove_rule(add=True):
- with open('/etc/qubes-rpc/policy/{}'.format(service), 'r+') as policy:
- policy_rules = policy.readlines()
- rule = "{} {} {}\n".format(source, destination,
- 'allow' if allow else 'deny')
- if add:
- policy_rules.insert(0, rule)
- else:
- policy_rules.remove(rule)
- policy.truncate(0)
- policy.seek(0)
- policy.write(''.join(policy_rules))
- add_remove_rule(add=True)
- self.addCleanup(add_remove_rule, add=False)
- def wait_for_window(self, title, timeout=30, show=True):
- """
- Wait for a window with a given title. Depending on show parameter,
- it will wait for either window to show or to disappear.
- :param title: title of the window to wait for
- :param timeout: timeout of the operation, in seconds
- :param show: if True - wait for the window to be visible,
- otherwise - to not be visible
- :return: None
- """
- wait_count = 0
- while subprocess.call(['xdotool', 'search', '--name', title],
- stdout=open(os.path.devnull, 'w'),
- stderr=subprocess.STDOUT) == int(show):
- wait_count += 1
- if wait_count > timeout*10:
- self.fail("Timeout while waiting for {} window to {}".format(
- title, "show" if show else "hide")
- )
- time.sleep(0.1)
- def enter_keys_in_window(self, title, keys):
- """
- Search for window with given title, then enter listed keys there.
- The function will wait for said window to appear.
- :param title: title of window
- :param keys: list of keys to enter, as for `xdotool key`
- :return: None
- """
- # 'xdotool search --sync' sometimes crashes on some race when
- # accessing window properties
- self.wait_for_window(title)
- command = ['xdotool', 'search', '--name', title,
- 'windowactivate',
- 'key'] + keys
- subprocess.check_call(command)
- def shutdown_and_wait(self, vm, timeout=60):
- vm.shutdown()
- while timeout > 0:
- if not vm.is_running():
- return
- time.sleep(1)
- timeout -= 1
- self.fail("Timeout while waiting for VM {} shutdown".format(vm.name))
- def prepare_hvm_system_linux(self, vm, init_script, extra_files=None):
- if not os.path.exists('/usr/lib/grub/i386-pc'):
- self.skipTest('grub2 not installed')
- if not spawn.find_executable('grub2-install'):
- self.skipTest('grub2-tools not installed')
- if not spawn.find_executable('dracut'):
- self.skipTest('dracut not installed')
- # create a single partition
- p = subprocess.Popen(['sfdisk', '-q', '-L', vm.storage.root_img],
- stdin=subprocess.PIPE,
- stdout=open(os.devnull, 'w'),
- stderr=subprocess.STDOUT)
- p.communicate('2048,\n')
- assert p.returncode == 0, 'sfdisk failed'
- # TODO: check if root_img is really file, not already block device
- p = subprocess.Popen(['sudo', 'losetup', '-f', '-P', '--show',
- vm.storage.root_img], stdout=subprocess.PIPE)
- (loopdev, _) = p.communicate()
- loopdev = loopdev.strip()
- looppart = loopdev + 'p1'
- assert p.returncode == 0, 'losetup failed'
- subprocess.check_call(['sudo', 'mkfs.ext2', '-q', '-F', looppart])
- mountpoint = tempfile.mkdtemp()
- subprocess.check_call(['sudo', 'mount', looppart, mountpoint])
- try:
- subprocess.check_call(['sudo', 'grub2-install',
- '--target', 'i386-pc',
- '--modules', 'part_msdos ext2',
- '--boot-directory', mountpoint, loopdev],
- stderr=open(os.devnull, 'w')
- )
- grub_cfg = '{}/grub2/grub.cfg'.format(mountpoint)
- subprocess.check_call(
- ['sudo', 'chown', '-R', os.getlogin(), mountpoint])
- with open(grub_cfg, 'w') as f:
- f.write(
- "set timeout=1\n"
- "menuentry 'Default' {\n"
- " linux /vmlinuz root=/dev/xvda1 "
- "rd.driver.blacklist=bochs_drm "
- "rd.driver.blacklist=uhci_hcd\n"
- " initrd /initrd\n"
- "}"
- )
- p = subprocess.Popen(['uname', '-r'], stdout=subprocess.PIPE)
- (kernel_version, _) = p.communicate()
- kernel_version = kernel_version.strip()
- kernel = '/boot/vmlinuz-{}'.format(kernel_version)
- shutil.copy(kernel, os.path.join(mountpoint, 'vmlinuz'))
- init_path = os.path.join(mountpoint, 'init')
- with open(init_path, 'w') as f:
- f.write(init_script)
- os.chmod(init_path, 0755)
- dracut_args = [
- '--kver', kernel_version,
- '--include', init_path,
- '/usr/lib/dracut/hooks/pre-pivot/initscript.sh',
- '--no-hostonly', '--nolvmconf', '--nomdadmconf',
- ]
- if extra_files:
- dracut_args += ['--install', ' '.join(extra_files)]
- subprocess.check_call(
- ['dracut'] + dracut_args + [os.path.join(mountpoint,
- 'initrd')],
- stderr=open(os.devnull, 'w')
- )
- finally:
- subprocess.check_call(['sudo', 'umount', mountpoint])
- shutil.rmtree(mountpoint)
- subprocess.check_call(['sudo', 'losetup', '-d', loopdev])
- # noinspection PyAttributeOutsideInit
- class BackupTestsMixin(SystemTestsMixin):
- class BackupErrorHandler(logging.Handler):
- def __init__(self, errors_queue, level=logging.NOTSET):
- super(BackupTestsMixin.BackupErrorHandler, self).__init__(level)
- self.errors_queue = errors_queue
- def emit(self, record):
- self.errors_queue.put(record.getMessage())
- def setUp(self):
- super(BackupTestsMixin, self).setUp()
- self.init_default_template()
- self.error_detected = multiprocessing.Queue()
- self.verbose = False
- if self.verbose:
- print >>sys.stderr, "-> Creating backupvm"
- self.backupdir = os.path.join(os.environ["HOME"], "test-backup")
- if os.path.exists(self.backupdir):
- shutil.rmtree(self.backupdir)
- os.mkdir(self.backupdir)
- self.error_handler = self.BackupErrorHandler(self.error_detected,
- level=logging.WARNING)
- backup_log = logging.getLogger('qubes.backup')
- backup_log.addHandler(self.error_handler)
- def tearDown(self):
- super(BackupTestsMixin, self).tearDown()
- shutil.rmtree(self.backupdir)
- backup_log = logging.getLogger('qubes.backup')
- backup_log.removeHandler(self.error_handler)
- def fill_image(self, path, size=None, sparse=False):
- block_size = 4096
- if self.verbose:
- print >>sys.stderr, "-> Filling %s" % path
- f = open(path, 'w+')
- if size is None:
- f.seek(0, 2)
- size = f.tell()
- f.seek(0)
- for block_num in xrange(size/block_size):
- f.write('a' * block_size)
- if sparse:
- f.seek(block_size, 1)
- f.close()
- # NOTE: this was create_basic_vms
- def create_backup_vms(self):
- template = self.app.default_template
- vms = []
- vmname = self.make_vm_name('test-net')
- if self.verbose:
- print >>sys.stderr, "-> Creating %s" % vmname
- testnet = self.app.add_new_vm(qubes.vm.appvm.AppVM,
- name=vmname, template=template, provides_network=True, label='red')
- testnet.create_on_disk()
- vms.append(testnet)
- self.fill_image(testnet.volumes['private'].vid, 20*1024*1024)
- vmname = self.make_vm_name('test1')
- if self.verbose:
- print >>sys.stderr, "-> Creating %s" % vmname
- testvm1 = self.app.add_new_vm(qubes.vm.appvm.AppVM,
- name=vmname, template=template, label='red')
- testvm1.uses_default_netvm = False
- testvm1.netvm = testnet
- testvm1.create_on_disk()
- vms.append(testvm1)
- self.fill_image(testvm1.volumes['private'].vid, 100*1024*1024)
- vmname = self.make_vm_name('testhvm1')
- if self.verbose:
- print >>sys.stderr, "-> Creating %s" % vmname
- testvm2 = self.app.add_new_vm(qubes.vm.standalonevm.StandaloneVM,
- name=vmname,
- hvm=True,
- label='red')
- testvm2.create_on_disk()
- self.fill_image(testvm2.volumes['root'].vid, 1024 * 1024 * 1024, True)
- vms.append(testvm2)
- vmname = self.make_vm_name('template')
- if self.verbose:
- print >>sys.stderr, "-> Creating %s" % vmname
- testvm3 = self.app.add_new_vm(qubes.vm.templatevm.TemplateVM,
- name=vmname, label='red')
- testvm3.create_on_disk()
- self.fill_image(testvm3.root_img, 100*1024*1024, True)
- vms.append(testvm3)
- vmname = self.make_vm_name('custom')
- if self.verbose:
- print >>sys.stderr, "-> Creating %s" % vmname
- testvm4 = self.app.add_new_vm(qubes.vm.appvm.AppVM,
- name=vmname, template=testvm3, label='red')
- testvm4.create_on_disk()
- vms.append(testvm4)
- self.app.save()
- return vms
- def make_backup(self, vms, target=None, expect_failure=False, **kwargs):
- if target is None:
- target = self.backupdir
- try:
- backup = qubes.backup.Backup(self.app, vms, **kwargs)
- except qubes.exc.QubesException as e:
- if not expect_failure:
- self.fail("QubesException during backup_prepare: %s" % str(e))
- else:
- raise
- backup.passphrase = 'qubes'
- backup.target_dir = target
- try:
- backup.backup_do()
- except qubes.exc.QubesException as e:
- if not expect_failure:
- self.fail("QubesException during backup_do: %s" % str(e))
- else:
- raise
- # FIXME why?
- #self.reload_db()
- def restore_backup(self, source=None, appvm=None, options=None,
- expect_errors=None):
- if source is None:
- backupfile = os.path.join(self.backupdir,
- sorted(os.listdir(self.backupdir))[-1])
- else:
- backupfile = source
- with self.assertNotRaises(qubes.exc.QubesException):
- restore_op = qubes.backup.BackupRestore(
- self.app, backupfile, appvm, "qubes")
- if options:
- for key, value in options.iteritems():
- setattr(restore_op.options, key, value)
- restore_info = restore_op.get_restore_info()
- if self.verbose:
- print restore_op.get_restore_summary(restore_info)
- with self.assertNotRaises(qubes.exc.QubesException):
- restore_op.restore_do(restore_info)
- # maybe someone forgot to call .save()
- self.reload_db()
- errors = []
- if expect_errors is None:
- expect_errors = []
- else:
- self.assertFalse(self.error_detected.empty(),
- "Restore errors expected, but none detected")
- while not self.error_detected.empty():
- current_error = self.error_detected.get()
- if any(map(current_error.startswith, expect_errors)):
- continue
- errors.append(current_error)
- self.assertTrue(len(errors) == 0,
- "Error(s) detected during backup_restore_do: %s" %
- '\n'.join(errors))
- if not appvm and not os.path.isdir(backupfile):
- os.unlink(backupfile)
- def create_sparse(self, path, size):
- f = open(path, "w")
- f.truncate(size)
- f.close()
- def load_tests(loader, tests, pattern): # pylint: disable=unused-argument
- # discard any tests from this module, because it hosts base classes
- tests = unittest.TestSuite()
- for modname in (
- # unit tests
- 'qubes.tests.events',
- 'qubes.tests.devices',
- 'qubes.tests.init',
- 'qubes.tests.vm.init',
- 'qubes.tests.storage',
- 'qubes.tests.storage_file',
- 'qubes.tests.vm.qubesvm',
- 'qubes.tests.vm.mix.net',
- 'qubes.tests.vm.adminvm',
- 'qubes.tests.app',
- ):
- tests.addTests(loader.loadTestsFromName(modname))
- tests.addTests(loader.discover(
- os.path.join(os.path.dirname(__file__), 'tools')))
- if not in_dom0:
- return tests
- for modname in (
- # integration tests
- 'qubes.tests.int.basic',
- 'qubes.tests.int.dom0_update',
- 'qubes.tests.int.network',
- # 'qubes.tests.vm_qrexec_gui',
- 'qubes.tests.int.backup',
- 'qubes.tests.int.backupcompatibility',
- # 'qubes.tests.regressions',
- # tool tests
- 'qubes.tests.int.tools.qubes_create',
- 'qubes.tests.int.tools.qvm_prefs',
- 'qubes.tests.int.tools.qvm_run',
- # external modules
- 'qubes.tests.extra',
- ):
- tests.addTests(loader.loadTestsFromName(modname))
- return tests
|