storage_file.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330
  1. # The Qubes OS Project, https://www.qubes-os.org/
  2. #
  3. # Copyright (C) 2015 Bahtiar `kalkin-` Gadimov <bahtiar@gadimov.de>
  4. #
  5. # This program is free software; you can redistribute it and/or modify
  6. # it under the terms of the GNU General Public License as published by
  7. # the Free Software Foundation; either version 2 of the License, or
  8. # (at your option) any later version.
  9. #
  10. # This program is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. # GNU General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU General Public License along
  16. # with this program; if not, write to the Free Software Foundation, Inc.,
  17. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  18. import os
  19. import shutil
  20. import qubes.storage
  21. import qubes.tests.storage
  22. from qubes.config import defaults
  23. from qubes.storage import Storage
  24. from qubes.storage.file import (OriginFile, ReadOnlyFile, ReadWriteFile,
  25. SnapshotFile, VolatileFile)
  26. from qubes.tests import QubesTestCase, SystemTestsMixin
  27. from qubes.tests.storage import TestVM
  28. # :pylint: disable=invalid-name
  29. class TC_00_FilePool(SystemTestsMixin, QubesTestCase):
  30. """ This class tests some properties of the 'default' pool. """
  31. def test000_default_pool_dir(self):
  32. """ The predefined dir for the default pool should be ``/var/lib/qubes``
  33. .. sealso::
  34. Data :data:``qubes.qubes.defaults['pool_config']``.
  35. """
  36. result = self.app.get_pool("default").dir_path
  37. expected = '/var/lib/qubes'
  38. self.assertEquals(result, expected)
  39. def test001_default_storage_class(self):
  40. """ Check when using default pool the Storage is ``Storage``. """
  41. result = self._init_app_vm().storage
  42. self.assertIsInstance(result, Storage)
  43. def _init_app_vm(self):
  44. """ Return initalised, but not created, AppVm. """
  45. vmname = self.make_vm_name('appvm')
  46. self.init_default_template()
  47. return self.app.add_new_vm(qubes.vm.appvm.AppVM,
  48. name=vmname,
  49. template=self.app.default_template,
  50. label='red')
  51. class TC_01_FileVolumes(SystemTestsMixin, QubesTestCase):
  52. POOL_DIR = '/var/lib/qubes/test-pool'
  53. POOL_NAME = 'test-pool'
  54. POOL_CONF = {'driver': 'file', 'dir_path': POOL_DIR, 'name': POOL_NAME}
  55. def setUp(self):
  56. """ Add a test file based storage pool """
  57. super(TC_01_FileVolumes, self).setUp()
  58. self.init_default_template()
  59. self.app.add_pool(**self.POOL_CONF)
  60. def tearDown(self):
  61. """ Remove the file based storage pool after testing """
  62. self.app.remove_pool("test-pool")
  63. super(TC_01_FileVolumes, self).tearDown()
  64. shutil.rmtree(self.POOL_DIR, ignore_errors=True)
  65. def test_000_origin_volume(self):
  66. config = {
  67. 'name': 'root',
  68. 'pool': self.POOL_NAME,
  69. 'volume_type': 'origin',
  70. 'size': defaults['root_img_size'],
  71. }
  72. vm = TestVM(self)
  73. result = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
  74. self.assertIsInstance(result, OriginFile)
  75. self.assertEqual(result.name, 'root')
  76. self.assertEqual(result.pool, self.POOL_NAME)
  77. self.assertEqual(result.size, defaults['root_img_size'])
  78. def test_001_snapshot_volume(self):
  79. original_path = '/var/lib/qubes/vm-templates/fedora-23/root.img'
  80. original_size = qubes.config.defaults['root_img_size']
  81. config = {
  82. 'name': 'root',
  83. 'pool': 'default',
  84. 'volume_type': 'snapshot',
  85. 'vid': original_path,
  86. }
  87. vm = TestVM(self, template=self.app.default_template)
  88. result = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
  89. self.assertIsInstance(result, SnapshotFile)
  90. self.assertEqual(result.name, 'root')
  91. self.assertEqual(result.pool, 'default')
  92. self.assertEqual(result.size, original_size)
  93. def test_002_read_write_volume(self):
  94. config = {
  95. 'name': 'root',
  96. 'pool': self.POOL_NAME,
  97. 'volume_type': 'read-write',
  98. 'size': defaults['root_img_size'],
  99. }
  100. vm = TestVM(self)
  101. result = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
  102. self.assertIsInstance(result, ReadWriteFile)
  103. self.assertEqual(result.name, 'root')
  104. self.assertEqual(result.pool, self.POOL_NAME)
  105. self.assertEqual(result.size, defaults['root_img_size'])
  106. def test_003_read_volume(self):
  107. template = self.app.default_template
  108. original_path = template.volumes['root'].vid
  109. original_size = qubes.config.defaults['root_img_size']
  110. config = {
  111. 'name': 'root',
  112. 'pool': 'default',
  113. 'volume_type': 'read-only',
  114. 'vid': original_path
  115. }
  116. vm = TestVM(self, template=template)
  117. result = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
  118. self.assertIsInstance(result, ReadOnlyFile)
  119. self.assertEqual(result.name, 'root')
  120. self.assertEqual(result.pool, 'default')
  121. self.assertEqual(result.size, original_size)
  122. def test_004_volatile_volume(self):
  123. config = {
  124. 'name': 'root',
  125. 'pool': self.POOL_NAME,
  126. 'volume_type': 'volatile',
  127. 'size': defaults['root_img_size'],
  128. }
  129. vm = TestVM(self)
  130. result = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
  131. self.assertIsInstance(result, VolatileFile)
  132. self.assertEqual(result.name, 'root')
  133. self.assertEqual(result.pool, self.POOL_NAME)
  134. self.assertEqual(result.size, defaults['root_img_size'])
  135. def test_005_appvm_volumes(self):
  136. ''' Check if AppVM volumes are propertly initialized '''
  137. vmname = self.make_vm_name('appvm')
  138. vm = self.app.add_new_vm(qubes.vm.appvm.AppVM,
  139. name=vmname,
  140. template=self.app.default_template,
  141. label='red')
  142. volumes = vm.volumes
  143. self.assertIsInstance(volumes['root'], SnapshotFile)
  144. self.assertIsInstance(volumes['private'], ReadWriteFile)
  145. self.assertIsInstance(volumes['volatile'], VolatileFile)
  146. expected = vm.template.dir_path + '/root.img:' + vm.template.dir_path \
  147. + '/root-cow.img'
  148. self.assertVolumePath(vm, 'root', expected, rw=False)
  149. expected = vm.dir_path + '/private.img'
  150. self.assertVolumePath(vm, 'private', expected, rw=True)
  151. expected = vm.dir_path + '/volatile.img'
  152. self.assertVolumePath(vm, 'volatile', expected, rw=True)
  153. def test_006_template_volumes(self):
  154. ''' Check if TemplateVM volumes are propertly initialized '''
  155. vmname = self.make_vm_name('appvm')
  156. vm = self.app.add_new_vm(qubes.vm.templatevm.TemplateVM,
  157. name=vmname,
  158. label='red')
  159. volumes = vm.volumes
  160. self.assertIsInstance(volumes['root'], OriginFile)
  161. self.assertIsInstance(volumes['private'], ReadWriteFile)
  162. self.assertIsInstance(volumes['volatile'], VolatileFile)
  163. expected = vm.dir_path + '/root.img:' + vm.dir_path + '/root-cow.img'
  164. self.assertVolumePath(vm, 'root', expected, rw=True)
  165. expected = vm.dir_path + '/private.img'
  166. self.assertVolumePath(vm, 'private', expected, rw=True)
  167. expected = vm.dir_path + '/volatile.img'
  168. self.assertVolumePath(vm, 'volatile', expected, rw=True)
  169. def assertVolumePath(self, vm, dev_name, expected, rw=True):
  170. # :pylint: disable=invalid-name
  171. volumes = vm.volumes
  172. b_dev = volumes[dev_name].block_device()
  173. self.assertEqual(b_dev.rw, rw)
  174. self.assertEquals(b_dev.path, expected)
  175. @qubes.tests.skipUnlessDom0
  176. class TC_03_FilePool(SystemTestsMixin, QubesTestCase):
  177. """ Test the paths for the default file based pool (``FilePool``).
  178. """
  179. POOL_DIR = '/var/lib/qubes/test-pool'
  180. APPVMS_DIR = '/var/lib/qubes/test-pool/appvms'
  181. TEMPLATES_DIR = '/var/lib/qubes/test-pool/vm-templates'
  182. SERVICE_DIR = '/var/lib/qubes/test-pool/servicevms'
  183. POOL_NAME = 'test-pool'
  184. POOL_CONFIG = {'driver': 'file', 'dir_path': POOL_DIR, 'name': POOL_NAME}
  185. def setUp(self):
  186. """ Add a test file based storage pool """
  187. super(TC_03_FilePool, self).setUp()
  188. self.init_default_template()
  189. self.app.add_pool(**self.POOL_CONFIG)
  190. def tearDown(self):
  191. """ Remove the file based storage pool after testing """
  192. self.app.remove_pool("test-pool")
  193. super(TC_03_FilePool, self).tearDown()
  194. shutil.rmtree(self.POOL_DIR, ignore_errors=True)
  195. def test_001_pool_exists(self):
  196. """ Check if the storage pool was added to the storage pool config """
  197. self.assertIn('test-pool', self.app.pools.keys())
  198. def test_002_pool_dir_create(self):
  199. """ Check if the storage pool dir and subdirs were created """
  200. # The dir should not exists before
  201. pool_name = 'foo'
  202. pool_dir = '/tmp/foo'
  203. appvms_dir = '/tmp/foo/appvms'
  204. templates_dir = '/tmp/foo/vm-templates'
  205. self.assertFalse(os.path.exists(pool_dir))
  206. self.app.add_pool(name=pool_name, dir_path=pool_dir, driver='file')
  207. self.assertTrue(os.path.exists(pool_dir))
  208. self.assertTrue(os.path.exists(appvms_dir))
  209. self.assertTrue(os.path.exists(templates_dir))
  210. shutil.rmtree(pool_dir, ignore_errors=True)
  211. def test_011_appvm_file_images(self):
  212. """ Check if all the needed image files are created for an AppVm"""
  213. vmname = self.make_vm_name('appvm')
  214. vm = self.app.add_new_vm(qubes.vm.appvm.AppVM,
  215. name=vmname,
  216. template=self.app.default_template,
  217. volume_config={
  218. 'private': {
  219. 'pool': 'test-pool'
  220. },
  221. 'volatile': {
  222. 'pool': 'test-pool'
  223. }
  224. },
  225. label='red')
  226. vm.storage.create_on_disk()
  227. expected_vmdir = os.path.join(self.APPVMS_DIR, vm.name)
  228. expected_private_path = os.path.join(expected_vmdir, 'private.img')
  229. self.assertEqualsAndExists(vm.volumes['private'].path,
  230. expected_private_path)
  231. expected_volatile_path = os.path.join(expected_vmdir, 'volatile.img')
  232. self.assertEqualsAndExists(vm.volumes['volatile'].path,
  233. expected_volatile_path)
  234. def test_013_template_file_images(self):
  235. """ Check if root.img, private.img, volatile.img and root-cow.img are
  236. created propertly by the storage system
  237. """
  238. vmname = self.make_vm_name('tmvm')
  239. vm = self.app.add_new_vm(qubes.vm.templatevm.TemplateVM,
  240. name=vmname,
  241. volume_config={
  242. 'root': {
  243. 'pool': 'test-pool'
  244. },
  245. 'private': {
  246. 'pool': 'test-pool'
  247. },
  248. 'volatile': {
  249. 'pool': 'test-pool'
  250. }
  251. },
  252. label='red')
  253. vm.create_on_disk()
  254. expected_vmdir = os.path.join(self.TEMPLATES_DIR, vm.name)
  255. expected_root_origin_path = os.path.join(expected_vmdir, 'root.img')
  256. expected_root_cow_path = os.path.join(expected_vmdir, 'root-cow.img')
  257. expected_root_path = '%s:%s' % (expected_root_origin_path,
  258. expected_root_cow_path)
  259. self.assertEquals(vm.volumes['root'].path, expected_root_path)
  260. self.assertExist(vm.volumes['root'].path_origin)
  261. expected_private_path = os.path.join(expected_vmdir, 'private.img')
  262. self.assertEqualsAndExists(vm.volumes['private'].path,
  263. expected_private_path)
  264. expected_volatile_path = os.path.join(expected_vmdir, 'volatile.img')
  265. self.assertEqualsAndExists(vm.volumes['volatile'].path,
  266. expected_volatile_path)
  267. vm.storage.commit_template_changes()
  268. expected_rootcow_path = os.path.join(expected_vmdir, 'root-cow.img')
  269. self.assertEqualsAndExists(vm.volumes['root'].path_cow,
  270. expected_rootcow_path)
  271. def assertEqualsAndExists(self, result_path, expected_path):
  272. """ Check if the ``result_path``, matches ``expected_path`` and exists.
  273. See also: :meth:``assertExist``
  274. """
  275. # :pylint: disable=invalid-name
  276. self.assertEquals(result_path, expected_path)
  277. self.assertExist(result_path)
  278. def assertExist(self, path):
  279. """ Assert that the given path exists. """
  280. # :pylint: disable=invalid-name
  281. self.assertTrue(os.path.exists(path), "Path %s does not exist" % path)