12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087 |
- # pylint: disable=protected-access
- #
- # The Qubes OS Project, https://www.qubes-os.org/
- #
- # Copyright (C) 2014-2015 Joanna Rutkowska <joanna@invisiblethingslab.com>
- # Copyright (C) 2014-2015 Wojtek Porczyk <woju@invisiblethingslab.com>
- #
- # This library is free software; you can redistribute it and/or
- # modify it under the terms of the GNU Lesser General Public
- # License as published by the Free Software Foundation; either
- # version 2.1 of the License, or (at your option) any later version.
- #
- # This library is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- # Lesser General Public License for more details.
- #
- # You should have received a copy of the GNU Lesser General Public
- # License along with this library; if not, see <https://www.gnu.org/licenses/>.
- #
- import base64
- import os
- import subprocess
- import tempfile
- import unittest
- import uuid
- import datetime
- import asyncio
- import functools
- import lxml.etree
- import unittest.mock
- import shutil
- import qubes
- import qubes.exc
- import qubes.config
- import qubes.devices
- import qubes.vm
- import qubes.vm.qubesvm
- import qubes.tests
- import qubes.tests.vm
- class TestApp(object):
- labels = {1: qubes.Label(1, '0xcc0000', 'red')}
- def __init__(self):
- self.domains = {}
- self.host = unittest.mock.Mock()
- self.host.memory_total = 4096 * 1024
- class TestFeatures(dict):
- def __init__(self, vm, **kwargs) -> None:
- self.vm = vm
- super().__init__(**kwargs)
- def check_with_template(self, feature, default):
- vm = self.vm
- while vm is not None:
- try:
- return vm.features[feature]
- except KeyError:
- vm = getattr(vm, 'template', None)
- return default
- class TestProp(object):
- # pylint: disable=too-few-public-methods
- __name__ = 'testprop'
- class TestDeviceCollection(object):
- def __init__(self):
- self._list = []
- def persistent(self):
- return self._list
- class TestQubesDB(object):
- def __init__(self, data=None):
- self.data = {}
- if data:
- self.data = data
- def write(self, path, value):
- self.data[path] = value
- def rm(self, path):
- if path.endswith('/'):
- for key in [x for x in self.data if x.startswith(path)]:
- del self.data[key]
- else:
- self.data.pop(path, None)
- def list(self, prefix):
- return [key for key in self.data if key.startswith(prefix)]
- def close(self):
- pass
- class TestVM(object):
- # pylint: disable=too-few-public-methods
- app = TestApp()
- def __init__(self, **kwargs):
- self.running = False
- self.installed_by_rpm = False
- for k, v in kwargs.items():
- setattr(self, k, v)
- self.devices = {'pci': TestDeviceCollection()}
- self.features = TestFeatures(self)
- def is_running(self):
- return self.running
- class TC_00_setters(qubes.tests.QubesTestCase):
- def setUp(self):
- super().setUp()
- self.vm = TestVM()
- self.prop = TestProp()
- def test_000_setter_qid(self):
- self.assertEqual(
- qubes.vm._setter_qid(self.vm, self.prop, 5), 5)
- def test_001_setter_qid_lt_0(self):
- with self.assertRaises(ValueError):
- qubes.vm._setter_qid(self.vm, self.prop, -1)
- def test_002_setter_qid_gt_max(self):
- with self.assertRaises(ValueError):
- qubes.vm._setter_qid(self.vm,
- self.prop, qubes.config.max_qid + 5)
- @unittest.skip('test not implemented')
- def test_020_setter_kernel(self):
- pass
- def test_030_setter_label_object(self):
- label = TestApp.labels[1]
- self.assertIs(label,
- qubes.vm.setter_label(self.vm, self.prop, label))
- def test_031_setter_label_getitem(self):
- label = TestApp.labels[1]
- self.assertIs(label,
- qubes.vm.setter_label(self.vm, self.prop, 'label-1'))
- # there is no check for self.app.get_label()
- def test_040_setter_virt_mode(self):
- self.assertEqual(
- qubes.vm.qubesvm._setter_virt_mode(self.vm, self.prop, 'hvm'),
- 'hvm')
- self.assertEqual(
- qubes.vm.qubesvm._setter_virt_mode(self.vm, self.prop, 'HVM'),
- 'hvm')
- self.assertEqual(
- qubes.vm.qubesvm._setter_virt_mode(self.vm, self.prop, 'PV'),
- 'pv')
- self.assertEqual(
- qubes.vm.qubesvm._setter_virt_mode(self.vm, self.prop, 'pvh'),
- 'pvh')
- self.vm.devices['pci']._list.append(object())
- with self.assertRaises(ValueError):
- qubes.vm.qubesvm._setter_virt_mode(self.vm, self.prop, 'pvh')
- with self.assertRaises(ValueError):
- qubes.vm.qubesvm._setter_virt_mode(self.vm, self.prop, 'True')
- class TC_10_default(qubes.tests.QubesTestCase):
- def setUp(self):
- super().setUp()
- self.app = TestApp()
- self.vm = TestVM(app=self.app)
- self.prop = TestProp()
- def test_000_default_with_template_simple(self):
- default_getter = qubes.vm.qubesvm._default_with_template('kernel',
- 'dfl-kernel')
- self.assertEqual(default_getter(self.vm), 'dfl-kernel')
- self.vm.template = None
- self.assertEqual(default_getter(self.vm), 'dfl-kernel')
- self.vm.template = unittest.mock.Mock()
- self.vm.template.kernel = 'template-kernel'
- self.assertEqual(default_getter(self.vm), 'template-kernel')
- def test_001_default_with_template_callable(self):
- default_getter = qubes.vm.qubesvm._default_with_template('kernel',
- lambda x: x.app.default_kernel)
- self.app.default_kernel = 'global-dfl-kernel'
- self.assertEqual(default_getter(self.vm), 'global-dfl-kernel')
- self.vm.template = None
- self.assertEqual(default_getter(self.vm), 'global-dfl-kernel')
- self.vm.template = unittest.mock.Mock()
- self.vm.template.kernel = 'template-kernel'
- self.assertEqual(default_getter(self.vm), 'template-kernel')
- def test_010_default_virt_mode(self):
- self.assertEqual(qubes.vm.qubesvm._default_virt_mode(self.vm),
- 'pvh')
- self.vm.template = unittest.mock.Mock()
- self.vm.template.virt_mode = 'hvm'
- self.assertEqual(qubes.vm.qubesvm._default_virt_mode(self.vm),
- 'hvm')
- self.vm.template = None
- self.assertEqual(qubes.vm.qubesvm._default_virt_mode(self.vm),
- 'pvh')
- self.vm.devices['pci'].persistent().append('some-dev')
- self.assertEqual(qubes.vm.qubesvm._default_virt_mode(self.vm),
- 'hvm')
- def test_020_default_maxmem(self):
- default_maxmem = 2048
- self.vm.is_memory_balancing_possible = \
- lambda: qubes.vm.qubesvm.QubesVM.is_memory_balancing_possible(
- self.vm)
- self.vm.virt_mode = 'pvh'
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm),
- default_maxmem)
- self.vm.virt_mode = 'hvm'
- # HVM without qubes tools
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm), 0)
- # just 'qrexec' feature
- self.vm.features['qrexec'] = True
- print(self.vm.features.check_with_template('qrexec', False))
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm),
- default_maxmem)
- # some supported-service.*, but not meminfo-writer
- self.vm.features['supported-service.qubes-firewall'] = True
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm), 0)
- # then add meminfo-writer
- self.vm.features['supported-service.meminfo-writer'] = True
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm),
- default_maxmem)
- def test_021_default_maxmem_with_pcidevs(self):
- self.vm.is_memory_balancing_possible = \
- lambda: qubes.vm.qubesvm.QubesVM.is_memory_balancing_possible(
- self.vm)
- self.vm.devices['pci'].persistent().append('00_00.0')
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm), 0)
- def test_022_default_maxmem_linux(self):
- self.vm.is_memory_balancing_possible = \
- lambda: qubes.vm.qubesvm.QubesVM.is_memory_balancing_possible(
- self.vm)
- self.vm.virt_mode = 'pvh'
- self.vm.memory = 400
- self.vm.features['os'] = 'Linux'
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm), 2048)
- self.vm.memory = 100
- self.assertEqual(qubes.vm.qubesvm._default_maxmem(self.vm), 1000)
- class QubesVMTestsMixin(object):
- property_no_default = object()
- def setUp(self):
- super(QubesVMTestsMixin, self).setUp()
- self.app = qubes.tests.vm.TestApp()
- self.app.vmm.offline_mode = True
- self.app.default_kernel = None
- # when full test run is called, extensions are loaded by earlier
- # tests, but if just this test class is run, load them manually here,
- # to have the same behaviour
- qubes.ext.get_extensions()
- def tearDown(self):
- try:
- # self.app is not a real events emiter, so make the call manually
- for handler in qubes.Qubes.__handlers__.get('qubes-close'):
- handler(self.app, 'qubes-close')
- self.app.domains.close()
- except AttributeError:
- pass
- super(QubesVMTestsMixin, self).tearDown()
- def get_vm(self, name='test', cls=qubes.vm.qubesvm.QubesVM, vm=None, **kwargs):
- if not vm:
- vm = cls(self.app, None,
- qid=kwargs.pop('qid', 1), name=qubes.tests.VMPREFIX + name,
- **kwargs)
- self.app.domains[vm.qid] = vm
- self.app.domains[vm.uuid] = vm
- self.app.domains[vm.name] = vm
- self.app.domains[vm] = vm
- self.addCleanup(vm.close)
- return vm
- def assertPropertyValue(self, vm, prop_name, set_value, expected_value,
- expected_xml_content=None):
- # FIXME: any better exception list? or maybe all of that should be a
- # single exception?
- with self.assertNotRaises((ValueError, TypeError, KeyError)):
- setattr(vm, prop_name, set_value)
- self.assertEqual(getattr(vm, prop_name), expected_value)
- if expected_xml_content is not None:
- xml = vm.__xml__()
- prop_xml = xml.xpath(
- './properties/property[@name=\'{}\']'.format(prop_name))
- self.assertEqual(len(prop_xml), 1, "Property not found in XML")
- self.assertEqual(prop_xml[0].text, expected_xml_content)
- def assertPropertyInvalidValue(self, vm, prop_name, set_value):
- orig_value_set = True
- orig_value = None
- try:
- orig_value = getattr(vm, prop_name)
- except AttributeError:
- orig_value_set = False
- # FIXME: any better exception list? or maybe all of that should be a
- # single exception?
- with self.assertRaises((ValueError, TypeError, KeyError)):
- setattr(vm, prop_name, set_value)
- if orig_value_set:
- self.assertEqual(getattr(vm, prop_name), orig_value)
- else:
- with self.assertRaises(AttributeError):
- getattr(vm, prop_name)
- def assertPropertyDefaultValue(self, vm, prop_name,
- expected_default=property_no_default):
- if expected_default is self.property_no_default:
- with self.assertRaises(AttributeError):
- getattr(vm, prop_name)
- else:
- with self.assertNotRaises(AttributeError):
- self.assertEqual(getattr(vm, prop_name), expected_default)
- xml = vm.__xml__()
- prop_xml = xml.xpath(
- './properties/property[@name=\'{}\']'.format(prop_name))
- self.assertEqual(len(prop_xml), 0, "Property still found in XML")
- def _test_generic_bool_property(self, vm, prop_name, default=False):
- self.assertPropertyDefaultValue(vm, prop_name, default)
- self.assertPropertyValue(vm, prop_name, False, False, 'False')
- self.assertPropertyValue(vm, prop_name, True, True, 'True')
- delattr(vm, prop_name)
- self.assertPropertyDefaultValue(vm, prop_name, default)
- self.assertPropertyValue(vm, prop_name, 'True', True, 'True')
- self.assertPropertyValue(vm, prop_name, 'False', False, 'False')
- self.assertPropertyInvalidValue(vm, prop_name, 'xxx')
- self.assertPropertyValue(vm, prop_name, 123, True)
- self.assertPropertyInvalidValue(vm, prop_name, '')
- class TC_90_QubesVM(QubesVMTestsMixin, qubes.tests.QubesTestCase):
- def test_000_init(self):
- self.get_vm()
- def test_001_init_no_qid_or_name(self):
- with self.assertRaises(AssertionError):
- qubes.vm.qubesvm.QubesVM(self.app, None,
- name=qubes.tests.VMPREFIX + 'test')
- with self.assertRaises(AssertionError):
- qubes.vm.qubesvm.QubesVM(self.app, None,
- qid=1)
- def test_003_init_fire_domain_init(self):
- class TestVM2(qubes.vm.qubesvm.QubesVM):
- event_fired = False
- @qubes.events.handler('domain-init')
- def on_domain_init(self, event): # pylint: disable=unused-argument
- self.__class__.event_fired = True
- TestVM2(self.app, None, qid=1, name=qubes.tests.VMPREFIX + 'test')
- self.assertTrue(TestVM2.event_fired)
- def test_004_uuid_autogen(self):
- vm = self.get_vm()
- self.assertTrue(hasattr(vm, 'uuid'))
- def test_100_qid(self):
- vm = self.get_vm()
- self.assertIsInstance(vm.qid, int)
- with self.assertRaises(AttributeError):
- vm.qid = 2
- def test_110_name(self):
- vm = self.get_vm()
- self.assertIsInstance(vm.name, str)
- def test_120_uuid(self):
- my_uuid = uuid.uuid4()
- vm = self.get_vm(uuid=my_uuid)
- self.assertIsInstance(vm.uuid, uuid.UUID)
- self.assertIs(vm.uuid, my_uuid)
- with self.assertRaises(AttributeError):
- vm.uuid = uuid.uuid4()
- @unittest.skip('TODO: how to not fail on making an icon symlink here?')
- def test_130_label(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'label')
- self.assertPropertyValue(vm, 'label', self.app.labels[1],
- self.app.labels[1], 'label-1')
- del vm.label
- self.assertPropertyDefaultValue(vm, 'label')
- self.assertPropertyValue(vm, 'label', 'red',
- self.app.labels[1], 'label-1')
- self.assertPropertyValue(vm, 'label', 'label-1',
- self.app.labels[1], 'label-1')
- def test_131_label_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'label', 'invalid')
- self.assertPropertyInvalidValue(vm, 'label', 123)
- def test_160_memory(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'memory', 400)
- self.assertPropertyValue(vm, 'memory', 500, 500, '500')
- del vm.memory
- self.assertPropertyDefaultValue(vm, 'memory', 400)
- self.assertPropertyValue(vm, 'memory', '500', 500, '500')
- def test_161_memory_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'memory', -100)
- self.assertPropertyInvalidValue(vm, 'memory', '-100')
- self.assertPropertyInvalidValue(vm, 'memory', '')
- # TODO: higher than maxmem
- # TODO: human readable setter (500M, 4G)?
- def test_170_maxmem(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'maxmem',
- self.app.host.memory_total / 1024 / 2)
- self.assertPropertyValue(vm, 'maxmem', 500, 500, '500')
- del vm.maxmem
- self.assertPropertyDefaultValue(vm, 'maxmem',
- self.app.host.memory_total / 1024 / 2)
- self.assertPropertyValue(vm, 'maxmem', '500', 500, '500')
- def test_171_maxmem_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'maxmem', -100)
- self.assertPropertyInvalidValue(vm, 'maxmem', '-100')
- self.assertPropertyInvalidValue(vm, 'maxmem', '')
- # TODO: lower than memory
- # TODO: human readable setter (500M, 4G)?
- def test_190_vcpus(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'vcpus', 2)
- self.assertPropertyValue(vm, 'vcpus', 3, 3, '3')
- del vm.vcpus
- self.assertPropertyDefaultValue(vm, 'vcpus', 2)
- self.assertPropertyValue(vm, 'vcpus', '3', 3, '3')
- def test_191_vcpus_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'vcpus', 0)
- self.assertPropertyInvalidValue(vm, 'vcpus', -2)
- self.assertPropertyInvalidValue(vm, 'vcpus', '-2')
- self.assertPropertyInvalidValue(vm, 'vcpus', '')
- def test_200_debug(self):
- vm = self.get_vm()
- self._test_generic_bool_property(vm, 'debug', False)
- def test_210_installed_by_rpm(self):
- vm = self.get_vm()
- self._test_generic_bool_property(vm, 'installed_by_rpm', False)
- def test_220_include_in_backups(self):
- vm = self.get_vm()
- self._test_generic_bool_property(vm, 'include_in_backups', True)
- @qubes.tests.skipUnlessDom0
- def test_250_kernel(self):
- kernels = os.listdir(os.path.join(
- qubes.config.qubes_base_dir,
- qubes.config.system_path['qubes_kernels_base_dir']))
- if not len(kernels):
- self.skipTest('Needs at least one kernel installed')
- self.app.default_kernel = kernels[0]
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'kernel', kernels[0])
- self.assertPropertyValue(vm, 'kernel', kernels[-1], kernels[-1],
- kernels[-1])
- del vm.kernel
- self.assertPropertyDefaultValue(vm, 'kernel', kernels[0])
- @qubes.tests.skipUnlessDom0
- def test_251_kernel_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'kernel', 123)
- self.assertPropertyInvalidValue(vm, 'kernel', 'invalid')
- def test_252_kernel_empty(self):
- vm = self.get_vm()
- self.assertPropertyValue(vm, 'kernel', '', '', '')
- self.assertPropertyValue(vm, 'kernel', None, '', '')
- @unittest.mock.patch.dict(qubes.config.system_path,
- {'qubes_kernels_base_dir': '/tmp'})
- def test_260_kernelopts(self):
- d = tempfile.mkdtemp(prefix='/tmp/')
- self.addCleanup(shutil.rmtree, d)
- open(d + '/vmlinuz', 'w').close()
- open(d + '/initramfs', 'w').close()
- vm = self.get_vm()
- vm.kernel = os.path.basename(d)
- self.assertPropertyDefaultValue(vm, 'kernelopts',
- qubes.config.defaults['kernelopts'])
- self.assertPropertyValue(vm, 'kernelopts', 'some options',
- 'some options', 'some options')
- del vm.kernelopts
- self.assertPropertyDefaultValue(vm, 'kernelopts',
- qubes.config.defaults['kernelopts'])
- self.assertPropertyValue(vm, 'kernelopts', '',
- '', '')
- # TODO?
- # self.assertPropertyInvalidValue(vm, 'kernelopts', None),
- @unittest.skip('test not implemented')
- def test_261_kernelopts_pcidevs(self):
- vm = self.get_vm()
- # how to do that here? use dummy DeviceManager/DeviceCollection?
- # Disable events?
- vm.devices['pci'].attach('something')
- self.assertPropertyDefaultValue(vm, 'kernelopts',
- qubes.config.defaults['kernelopts_pcidevs'])
- @unittest.mock.patch.dict(qubes.config.system_path,
- {'qubes_kernels_base_dir': '/tmp'})
- def test_262_kernelopts(self):
- d = tempfile.mkdtemp(prefix='/tmp/')
- self.addCleanup(shutil.rmtree, d)
- open(d + '/vmlinuz', 'w').close()
- open(d + '/initramfs', 'w').close()
- with open(d + '/default-kernelopts-nopci.txt', 'w') as f:
- f.write('some default options')
- vm = self.get_vm()
- vm.kernel = os.path.basename(d)
- self.assertPropertyDefaultValue(vm, 'kernelopts',
- 'some default options')
- self.assertPropertyValue(vm, 'kernelopts', 'some options',
- 'some options', 'some options')
- del vm.kernelopts
- self.assertPropertyDefaultValue(vm, 'kernelopts',
- 'some default options')
- self.assertPropertyValue(vm, 'kernelopts', '',
- '', '')
- def test_270_qrexec_timeout(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'qrexec_timeout', 60)
- self.assertPropertyValue(vm, 'qrexec_timeout', 3, 3, '3')
- del vm.qrexec_timeout
- self.assertPropertyDefaultValue(vm, 'qrexec_timeout', 60)
- self.assertPropertyValue(vm, 'qrexec_timeout', '3', 3, '3')
- def test_271_qrexec_timeout_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'qrexec_timeout', -2)
- self.assertPropertyInvalidValue(vm, 'qrexec_timeout', '-2')
- self.assertPropertyInvalidValue(vm, 'qrexec_timeout', '')
- def test_272_qrexec_timeout_global_changed(self):
- self.app.default_qrexec_timeout = 123
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'qrexec_timeout', 123)
- self.assertPropertyValue(vm, 'qrexec_timeout', 3, 3, '3')
- del vm.qrexec_timeout
- self.assertPropertyDefaultValue(vm, 'qrexec_timeout', 123)
- self.assertPropertyValue(vm, 'qrexec_timeout', '3', 3, '3')
- def test_280_autostart(self):
- vm = self.get_vm()
- # FIXME any better idea to not involve systemctl call at this stage?
- vm.events_enabled = False
- self._test_generic_bool_property(vm, 'autostart', False)
- @qubes.tests.skipUnlessDom0
- def test_281_autostart_systemd(self):
- vm = self.get_vm()
- self.assertFalse(os.path.exists(
- '/etc/systemd/system/multi-user.target.wants/'
- 'qubes-vm@{}.service'.format(vm.name)),
- "systemd service enabled before setting autostart")
- vm.autostart = True
- self.assertTrue(os.path.exists(
- '/etc/systemd/system/multi-user.target.wants/'
- 'qubes-vm@{}.service'.format(vm.name)),
- "systemd service not enabled by autostart=True")
- vm.autostart = False
- self.assertFalse(os.path.exists(
- '/etc/systemd/system/multi-user.target.wants/'
- 'qubes-vm@{}.service'.format(vm.name)),
- "systemd service not disabled by autostart=False")
- vm.autostart = True
- del vm.autostart
- self.assertFalse(os.path.exists(
- '/etc/systemd/system/multi-user.target.wants/'
- 'qubes-vm@{}.service'.format(vm.name)),
- "systemd service not disabled by resetting autostart")
- def test_290_management_dispvm(self):
- vm = self.get_vm()
- vm2 = self.get_vm('test2', qid=2)
- self.app.management_dispvm = None
- self.assertPropertyDefaultValue(vm, 'management_dispvm', None)
- self.app.management_dispvm = vm
- try:
- self.assertPropertyDefaultValue(vm, 'management_dispvm', vm)
- self.assertPropertyValue(vm, 'management_dispvm',
- 'test-inst-test2', vm2)
- finally:
- self.app.management_dispvm = None
- def test_291_management_dispvm_template_based(self):
- tpl = self.get_vm(name='tpl', cls=qubes.vm.templatevm.TemplateVM)
- vm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=tpl, qid=2)
- vm2 = self.get_vm('test2', qid=3)
- del vm.volumes
- self.app.management_dispvm = None
- try:
- self.assertPropertyDefaultValue(vm, 'management_dispvm', None)
- self.app.management_dispvm = vm
- self.assertPropertyDefaultValue(vm, 'management_dispvm', vm)
- tpl.management_dispvm = vm2
- self.assertPropertyDefaultValue(vm, 'management_dispvm', vm2)
- self.assertPropertyValue(vm, 'management_dispvm',
- 'test-inst-test2', vm2)
- finally:
- self.app.management_dispvm = None
- @unittest.skip('TODO')
- def test_320_seamless_gui_mode(self):
- vm = self.get_vm()
- self._test_generic_bool_property(vm, 'seamless_gui_mode')
- # TODO: reject setting to True when guiagent_installed is false
- def test_330_mac(self):
- vm = self.get_vm()
- # TODO: calculate proper default here
- default_mac = vm.mac
- self.assertIsNotNone(default_mac)
- self.assertPropertyDefaultValue(vm, 'mac', default_mac)
- self.assertPropertyValue(vm, 'mac', '00:11:22:33:44:55',
- '00:11:22:33:44:55', '00:11:22:33:44:55')
- del vm.mac
- self.assertPropertyDefaultValue(vm, 'mac', default_mac)
- def test_331_mac_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'mac', 123)
- self.assertPropertyInvalidValue(vm, 'mac', 'invalid')
- self.assertPropertyInvalidValue(vm, 'mac', '00:11:22:33:44:55:66')
- def test_340_default_user(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'default_user', 'user')
- self.assertPropertyValue(vm, 'default_user', 'someuser', 'someuser',
- 'someuser')
- del vm.default_user
- self.assertPropertyDefaultValue(vm, 'default_user', 'user')
- self.assertPropertyValue(vm, 'default_user', 123, '123', '123')
- vm.default_user = 'user'
- # TODO: check propagation for template-based VMs
- @unittest.skip('TODO')
- def test_350_timezone(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'timezone', 'localtime')
- self.assertPropertyValue(vm, 'timezone', 0, 0, '0')
- del vm.timezone
- self.assertPropertyDefaultValue(vm, 'timezone', 'localtime')
- self.assertPropertyValue(vm, 'timezone', '0', 0, '0')
- self.assertPropertyValue(vm, 'timezone', -3600, -3600, '-3600')
- self.assertPropertyValue(vm, 'timezone', 7200, 7200, '7200')
- @unittest.skip('TODO')
- def test_350_timezone_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'timezone', 'xxx')
- @unittest.skip('TODO')
- def test_360_drive(self):
- vm = self.get_vm()
- self.assertPropertyDefaultValue(vm, 'drive', None)
- # self.execute_tests('drive', [
- # ('hd:dom0:/tmp/drive.img', 'hd:dom0:/tmp/drive.img', True),
- # ('hd:/tmp/drive.img', 'hd:dom0:/tmp/drive.img', True),
- # ('cdrom:dom0:/tmp/drive.img', 'cdrom:dom0:/tmp/drive.img', True),
- # ('cdrom:/tmp/drive.img', 'cdrom:dom0:/tmp/drive.img', True),
- # ('/tmp/drive.img', 'cdrom:dom0:/tmp/drive.img', True),
- # ('hd:drive.img', '', False),
- # ('drive.img', '', False),
- # ])
- def test_400_backup_timestamp(self):
- vm = self.get_vm()
- timestamp = datetime.datetime(2016, 1, 1, 12, 14, 2)
- timestamp_str = timestamp.strftime('%s')
- self.assertPropertyDefaultValue(vm, 'backup_timestamp', None)
- self.assertPropertyValue(vm, 'backup_timestamp', int(timestamp_str),
- int(timestamp_str), timestamp_str)
- del vm.backup_timestamp
- self.assertPropertyDefaultValue(vm, 'backup_timestamp', None)
- self.assertPropertyValue(vm, 'backup_timestamp', timestamp_str,
- int(timestamp_str))
- def test_401_backup_timestamp_invalid(self):
- vm = self.get_vm()
- self.assertPropertyInvalidValue(vm, 'backup_timestamp', 'xxx')
- self.assertPropertyInvalidValue(vm, 'backup_timestamp', None)
- def test_500_property_migrate_virt_mode(self):
- xml_template = '''
- <domain class="QubesVM" id="domain-1">
- <properties>
- <property name="qid">1</property>
- <property name="name">testvm</property>
- <property name="label" ref="label-1" />
- <property name="hvm">{hvm_value}</property>
- </properties>
- </domain>
- '''
- xml = lxml.etree.XML(xml_template.format(hvm_value='True'))
- vm = qubes.vm.qubesvm.QubesVM(self.app, xml)
- self.assertEqual(vm.virt_mode, 'hvm')
- with self.assertRaises(AttributeError):
- vm.hvm
- xml = lxml.etree.XML(xml_template.format(hvm_value='False'))
- vm = qubes.vm.qubesvm.QubesVM(self.app, xml)
- self.assertEqual(vm.virt_mode, 'pv')
- with self.assertRaises(AttributeError):
- vm.hvm
- def test_600_libvirt_xml_pv(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">500</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <os>
- <type arch="x86_64" machine="xenpv">linux</type>
- <kernel>/tmp/kernel/vmlinuz</kernel>
- <initrd>/tmp/kernel/initramfs</initrd>
- <cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat</cmdline>
- </os>
- <features>
- </features>
- <clock offset='utc' adjustment='reset'>
- <timer name="tsc" mode="native"/>
- </clock>
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/tmp/kernel/modules.img" />
- <target dev="xvdd" />
- <backenddomain name="dom0" />
- </disk>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'pv'
- with unittest.mock.patch('qubes.config.qubes_base_dir',
- '/tmp/qubes-test'):
- kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
- os.makedirs(kernel_dir, exist_ok=True)
- open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
- open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
- self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
- vm.kernel = 'dummy'
- # tests for storage are later
- vm.volumes['kernel'] = unittest.mock.Mock(**{
- 'kernels_dir': '/tmp/kernel',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': None,
- 'block_device.return_value.path': '/tmp/kernel/modules.img',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.name': 'kernel',
- })
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_hvm(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">400</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_hvm_dom0_kernel(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">500</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- <cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat</cmdline>
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- vm.features['qrexec'] = True
- with unittest.mock.patch('qubes.config.qubes_base_dir',
- '/tmp/qubes-test'):
- kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
- os.makedirs(kernel_dir, exist_ok=True)
- open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
- open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
- self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
- vm.kernel = 'dummy'
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_hvm_dom0_kernel_kernelopts(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">500</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- <cmdline>kernel specific options nopat</cmdline>
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- vm.features['qrexec'] = True
- with unittest.mock.patch('qubes.config.qubes_base_dir',
- '/tmp/qubes-test'):
- kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
- os.makedirs(kernel_dir, exist_ok=True)
- open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
- open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
- with open(os.path.join(kernel_dir,
- 'default-kernelopts-common.txt'), 'w') as f:
- f.write('kernel specific options \n')
- self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
- vm.kernel = 'dummy'
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_pvh(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">500</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenpvh">xenpvh</type>
- <kernel>/tmp/kernel/vmlinuz</kernel>
- <initrd>/tmp/kernel/initramfs</initrd>
- <cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat</cmdline>
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset='utc' adjustment='reset'>
- <timer name="tsc" mode="native"/>
- </clock>
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/tmp/kernel/modules.img" />
- <target dev="xvdd" />
- <backenddomain name="dom0" />
- </disk>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'pvh'
- with unittest.mock.patch('qubes.config.qubes_base_dir',
- '/tmp/qubes-test'):
- kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
- os.makedirs(kernel_dir, exist_ok=True)
- open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
- open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
- self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
- vm.kernel = 'dummy'
- # tests for storage are later
- vm.volumes['kernel'] = unittest.mock.Mock(**{
- 'kernels_dir': '/tmp/kernel',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': None,
- 'block_device.return_value.path': '/tmp/kernel/modules.img',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.name': 'kernel',
- })
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_pvh_no_membalance(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">400</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenpvh">xenpvh</type>
- <kernel>/tmp/kernel/vmlinuz</kernel>
- <initrd>/tmp/kernel/initramfs</initrd>
- <cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat</cmdline>
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset='utc' adjustment='reset'>
- <timer name="tsc" mode="native"/>
- </clock>
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/tmp/kernel/modules.img" />
- <target dev="xvdd" />
- <backenddomain name="dom0" />
- </disk>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'pvh'
- vm.maxmem = 0
- with unittest.mock.patch('qubes.config.qubes_base_dir',
- '/tmp/qubes-test'):
- kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
- os.makedirs(kernel_dir, exist_ok=True)
- open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
- open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
- self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
- vm.kernel = 'dummy'
- # tests for storage are later
- vm.volumes['kernel'] = unittest.mock.Mock(**{
- 'kernels_dir': '/tmp/kernel',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': None,
- 'block_device.return_value.path': '/tmp/kernel/modules.img',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.name': 'kernel',
- })
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_hvm_pcidev(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">400</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- <xen>
- <e820_host state="on"/>
- </xen>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <hostdev type="pci" managed="yes">
- <source>
- <address
- bus="0x00"
- slot="0x00"
- function="0x0" />
- </source>
- </hostdev>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- # required for PCI devices listing
- self.app.vmm.offline_mode = False
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- vm.kernel = None
- # even with meminfo-writer enabled, should have memory==maxmem
- vm.features['service.meminfo-writer'] = True
- assignment = qubes.devices.DeviceAssignment(
- vm, # this is violation of API, but for PCI the argument
- # is unused
- '00_00.0',
- bus='pci',
- persistent=True)
- vm.devices['pci']._set.add(
- assignment)
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_hvm_cdrom_boot(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">400</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <disk type="block" device="cdrom">
- <driver name="phy" />
- <source dev="/dev/sda" />
- <!-- prefer xvdd for CDROM -->
- <target dev="xvdd" />
- <readonly/>
- </disk>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- qdb = {
- '/qubes-block-devices/sda': b'',
- '/qubes-block-devices/sda/desc': b'Test device',
- '/qubes-block-devices/sda/size': b'1024000',
- '/qubes-block-devices/sda/mode': b'r',
- }
- test_qdb = TestQubesDB(qdb)
- dom0 = qubes.vm.adminvm.AdminVM(self.app, None)
- dom0._qdb_connection = test_qdb
- self.get_vm('dom0', vm=dom0)
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- vm.kernel = None
- dom0.events_enabled = True
- self.app.vmm.offline_mode = False
- dev = qubes.devices.DeviceAssignment(
- dom0, 'sda',
- {'devtype': 'cdrom', 'read-only': 'yes'}, persistent=True)
- self.loop.run_until_complete(vm.devices['block'].attach(dev))
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_600_libvirt_xml_hvm_cdrom_dom0_kernel_boot(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">400</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- <cmdline>root=/dev/mapper/dmroot ro nomodeset console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat</cmdline>
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/tmp/kernel/modules.img" />
- <target dev="xvdd" />
- <backenddomain name="dom0" />
- </disk>
- <disk type="block" device="cdrom">
- <driver name="phy" />
- <source dev="/dev/sda" />
- <target dev="xvdi" />
- <readonly/>
- </disk>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- qdb = {
- '/qubes-block-devices/sda': b'',
- '/qubes-block-devices/sda/desc': b'Test device',
- '/qubes-block-devices/sda/size': b'1024000',
- '/qubes-block-devices/sda/mode': b'r',
- }
- test_qdb = TestQubesDB(qdb)
- dom0 = qubes.vm.adminvm.AdminVM(self.app, None)
- dom0._qdb_connection = test_qdb
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- with unittest.mock.patch('qubes.config.qubes_base_dir',
- '/tmp/qubes-test'):
- kernel_dir = '/tmp/qubes-test/vm-kernels/dummy'
- os.makedirs(kernel_dir, exist_ok=True)
- open(os.path.join(kernel_dir, 'vmlinuz'), 'w').close()
- open(os.path.join(kernel_dir, 'initramfs'), 'w').close()
- self.addCleanup(shutil.rmtree, '/tmp/qubes-test')
- vm.kernel = 'dummy'
- # tests for storage are later
- vm.volumes['kernel'] = unittest.mock.Mock(**{
- 'kernels_dir': '/tmp/kernel',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': None,
- 'block_device.return_value.path': '/tmp/kernel/modules.img',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.name': 'kernel',
- })
- dom0.events_enabled = True
- self.app.vmm.offline_mode = False
- dev = qubes.devices.DeviceAssignment(
- dom0, 'sda',
- {'devtype': 'cdrom', 'read-only': 'yes'}, persistent=True)
- self.loop.run_until_complete(vm.devices['block'].attach(dev))
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- def test_610_libvirt_xml_network(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">500</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <interface type="ethernet">
- <mac address="00:16:3e:5e:6c:00" />
- <ip address="10.137.0.1" />
- {extra_ip}
- <backenddomain name="test-inst-netvm" />
- <script path="vif-route-qubes" />
- </interface>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" cmdline="-qubes-net:client_ip=10.137.0.1,dns_0=10.139.1.1,dns_1=10.139.1.2,gw=10.137.0.2,netmask=255.255.255.255" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- netvm = self.get_vm(qid=2, name='netvm', provides_network=True)
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = netvm
- vm.virt_mode = 'hvm'
- vm.features['qrexec'] = True
- with self.subTest('ipv4_only'):
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected.format(extra_ip='')))
- with self.subTest('ipv6'):
- netvm.features['ipv6'] = True
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected.format(
- extra_ip='<ip address="{}::a89:1" family=\'ipv6\'/>'.format(
- qubes.config.qubes_ipv6_prefix.replace(':0000', '')))))
- def test_615_libvirt_xml_block_devices(self):
- expected = '''<domain type="xen">
- <name>test-inst-test</name>
- <uuid>7db78950-c467-4863-94d1-af59806384ea</uuid>
- <memory unit="MiB">400</memory>
- <currentMemory unit="MiB">400</currentMemory>
- <vcpu placement="static">2</vcpu>
- <cpu mode='host-passthrough'>
- <!-- disable nested HVM -->
- <feature name='vmx' policy='disable'/>
- <feature name='svm' policy='disable'/>
- <!-- disable SMAP inside VM, because of Linux bug -->
- <feature name='smap' policy='disable'/>
- </cpu>
- <os>
- <type arch="x86_64" machine="xenfv">hvm</type>
- <!--
- For the libxl backend libvirt switches between OVMF (UEFI)
- and SeaBIOS based on the loader type. This has nothing to
- do with the hvmloader binary.
- -->
- <loader type="rom">hvmloader</loader>
- <boot dev="cdrom" />
- <boot dev="hd" />
- </os>
- <features>
- <pae/>
- <acpi/>
- <apic/>
- <viridian/>
- </features>
- <clock offset="variable" adjustment="0" basis="localtime" />
- <on_poweroff>destroy</on_poweroff>
- <on_reboot>destroy</on_reboot>
- <on_crash>destroy</on_crash>
- <devices>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/dev/loop0" />
- <target dev="xvda" />
- <backenddomain name="dom0" />
- <script path="/tmp/script" />
- </disk>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/dev/loop1" />
- <target dev="xvde" />
- <backenddomain name="dom0" />
- </disk>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/dev/loop2" />
- <target dev="xvdf" />
- <backenddomain name="dom0" />
- </disk>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/dev/sdb" />
- <target dev="xvdl" />
- </disk>
- <disk type="block" device="cdrom">
- <driver name="phy" />
- <source dev="/dev/sda" />
- <!-- prefer xvdd for CDROM -->
- <target dev="xvdd" />
- </disk>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/dev/loop0" />
- <target dev="xvdi" />
- <backenddomain name="backend0" />
- </disk>
- <disk type="block" device="disk">
- <driver name="phy" />
- <source dev="/dev/loop0" />
- <target dev="xvdj" />
- <backenddomain name="backend1" />
- </disk>
- <!-- server_ip is the address of stubdomain. It hosts it's own DNS server. -->
- <emulator type="stubdom-linux" />
- <input type="tablet" bus="usb"/>
- <video>
- <model type="vga"/>
- </video>
- <graphics type="qubes"/>
- <console type="pty">
- <target type="xen" port="0"/>
- </console>
- </devices>
- </domain>
- '''
- my_uuid = '7db78950-c467-4863-94d1-af59806384ea'
- vm = self.get_vm(uuid=my_uuid)
- vm.netvm = None
- vm.virt_mode = 'hvm'
- vm.volumes['root'] = unittest.mock.Mock(**{
- 'block_device.return_value.name': 'root',
- 'block_device.return_value.path': '/dev/loop0',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': '/tmp/script',
- })
- vm.volumes['other'] = unittest.mock.Mock(**{
- 'block_device.return_value.name': 'other',
- 'block_device.return_value.path': '/dev/loop1',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': None,
- })
- vm.volumes['other2'] = unittest.mock.Mock(**{
- 'block_device.return_value.name': 'other',
- 'block_device.return_value.path': '/dev/loop2',
- 'block_device.return_value.devtype': 'disk',
- 'block_device.return_value.domain': 'dom0',
- 'block_device.return_value.script': None,
- })
- assignments = [
- unittest.mock.Mock(**{
- 'options': {'frontend-dev': 'xvdl'},
- 'device.device_node': '/dev/sdb',
- 'device.backend_domain.name': 'dom0',
- }),
- unittest.mock.Mock(**{
- 'options': {'devtype': 'cdrom'},
- 'device.device_node': '/dev/sda',
- 'device.backend_domain.name': 'dom0',
- }),
- unittest.mock.Mock(**{
- 'options': {'read-only': True},
- 'device.device_node': '/dev/loop0',
- 'device.backend_domain.name': 'backend0',
- }),
- unittest.mock.Mock(**{
- 'options': {},
- 'device.device_node': '/dev/loop0',
- 'device.backend_domain.name': 'backend1',
- }),
- ]
- vm.devices['block'].assignments = lambda persistent: assignments
- libvirt_xml = vm.create_config_file()
- self.assertXMLEqual(lxml.etree.XML(libvirt_xml),
- lxml.etree.XML(expected))
- @unittest.mock.patch('qubes.utils.get_timezone')
- @unittest.mock.patch('qubes.utils.urandom')
- @unittest.mock.patch('qubes.vm.qubesvm.QubesVM.untrusted_qdb')
- def test_620_qdb_standalone(self, mock_qubesdb, mock_urandom,
- mock_timezone):
- mock_urandom.return_value = b'A' * 64
- mock_timezone.return_value = 'UTC'
- vm = self.get_vm(cls=qubes.vm.standalonevm.StandaloneVM)
- vm.netvm = None
- vm.events_enabled = True
- test_qubesdb = TestQubesDB()
- mock_qubesdb.write.side_effect = test_qubesdb.write
- mock_qubesdb.rm.side_effect = test_qubesdb.rm
- vm.create_qdb_entries()
- self.maxDiff = None
- iptables_header = (
- '# Generated by Qubes Core on {}\n'
- '*filter\n'
- ':INPUT DROP [0:0]\n'
- ':FORWARD DROP [0:0]\n'
- ':OUTPUT ACCEPT [0:0]\n'
- '-A INPUT -i vif+ -p udp -m udp --dport 68 -j DROP\n'
- '-A INPUT -m conntrack --ctstate '
- 'RELATED,ESTABLISHED -j ACCEPT\n'
- '-A INPUT -p icmp -j ACCEPT\n'
- '-A INPUT -i lo -j ACCEPT\n'
- '-A INPUT -j REJECT --reject-with '
- 'icmp-host-prohibited\n'
- '-A FORWARD -m conntrack --ctstate '
- 'RELATED,ESTABLISHED -j ACCEPT\n'
- '-A FORWARD -i vif+ -o vif+ -j DROP\n'
- 'COMMIT\n'.format(datetime.datetime.now().ctime()))
- self.assertEqual(test_qubesdb.data, {
- '/name': 'test-inst-test',
- '/type': 'StandaloneVM',
- '/default-user': 'user',
- '/qubes-vm-type': 'AppVM',
- '/qubes-debug-mode': '0',
- '/qubes-base-template': '',
- '/qubes-timezone': 'UTC',
- '/qubes-random-seed': base64.b64encode(b'A' * 64),
- '/qubes-vm-persistence': 'full',
- '/qubes-vm-updateable': 'True',
- '/qubes-block-devices': '',
- '/qubes-usb-devices': '',
- '/qubes-iptables': 'reload',
- '/qubes-iptables-error': '',
- '/qubes-iptables-header': iptables_header,
- '/qubes-service/qubes-update-check': '0',
- '/qubes-service/meminfo-writer': '1',
- '/connected-ips': '',
- '/connected-ips6': '',
- })
- @unittest.mock.patch('datetime.datetime')
- @unittest.mock.patch('qubes.utils.get_timezone')
- @unittest.mock.patch('qubes.utils.urandom')
- @unittest.mock.patch('qubes.vm.qubesvm.QubesVM.untrusted_qdb')
- def test_621_qdb_vm_with_network(self, mock_qubesdb, mock_urandom,
- mock_timezone, mock_datetime):
- mock_urandom.return_value = b'A' * 64
- mock_timezone.return_value = 'UTC'
- template = self.get_vm(cls=qubes.vm.templatevm.TemplateVM, name='template')
- template.netvm = None
- netvm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=template,
- name='netvm', qid=2, provides_network=True)
- vm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=template,
- name='appvm', qid=3)
- vm.netvm = netvm
- vm.kernel = None
- # pretend the VM is running...
- vm._qubesprop_xid = 3
- netvm.kernel = None
- test_qubesdb = TestQubesDB()
- mock_qubesdb.write.side_effect = test_qubesdb.write
- mock_qubesdb.rm.side_effect = test_qubesdb.rm
- self.maxDiff = None
- mock_datetime.now.returnvalue = \
- datetime.datetime(2019, 2, 27, 15, 12, 15, 385822)
- iptables_header = (
- '# Generated by Qubes Core on {}\n'
- '*filter\n'
- ':INPUT DROP [0:0]\n'
- ':FORWARD DROP [0:0]\n'
- ':OUTPUT ACCEPT [0:0]\n'
- '-A INPUT -i vif+ -p udp -m udp --dport 68 -j DROP\n'
- '-A INPUT -m conntrack --ctstate '
- 'RELATED,ESTABLISHED -j ACCEPT\n'
- '-A INPUT -p icmp -j ACCEPT\n'
- '-A INPUT -i lo -j ACCEPT\n'
- '-A INPUT -j REJECT --reject-with '
- 'icmp-host-prohibited\n'
- '-A FORWARD -m conntrack --ctstate '
- 'RELATED,ESTABLISHED -j ACCEPT\n'
- '-A FORWARD -i vif+ -o vif+ -j DROP\n'
- 'COMMIT\n'.format(datetime.datetime.now().ctime()))
- expected = {
- '/name': 'test-inst-appvm',
- '/type': 'AppVM',
- '/default-user': 'user',
- '/qubes-vm-type': 'AppVM',
- '/qubes-debug-mode': '0',
- '/qubes-base-template': 'test-inst-template',
- '/qubes-timezone': 'UTC',
- '/qubes-random-seed': base64.b64encode(b'A' * 64),
- '/qubes-vm-persistence': 'rw-only',
- '/qubes-vm-updateable': 'False',
- '/qubes-block-devices': '',
- '/qubes-usb-devices': '',
- '/qubes-iptables': 'reload',
- '/qubes-iptables-error': '',
- '/qubes-iptables-header': iptables_header,
- '/qubes-service/qubes-update-check': '0',
- '/qubes-service/meminfo-writer': '1',
- '/qubes-mac': '00:16:3e:5e:6c:00',
- '/qubes-ip': '10.137.0.3',
- '/qubes-netmask': '255.255.255.255',
- '/qubes-gateway': '10.137.0.2',
- '/qubes-primary-dns': '10.139.1.1',
- '/qubes-secondary-dns': '10.139.1.2',
- '/connected-ips': '',
- '/connected-ips6': '',
- }
- with self.subTest('ipv4'):
- vm.create_qdb_entries()
- self.assertEqual(test_qubesdb.data, expected)
- test_qubesdb.data.clear()
- with self.subTest('ipv6'):
- netvm.features['ipv6'] = True
- expected['/qubes-ip6'] = \
- qubes.config.qubes_ipv6_prefix.replace(':0000', '') + \
- '::a89:3'
- expected['/qubes-gateway6'] = expected['/qubes-ip6'][:-1] + '2'
- vm.create_qdb_entries()
- self.assertEqual(test_qubesdb.data, expected)
- test_qubesdb.data.clear()
- with self.subTest('ipv6_just_appvm'):
- del netvm.features['ipv6']
- vm.features['ipv6'] = True
- expected['/qubes-ip6'] = \
- qubes.config.qubes_ipv6_prefix.replace(':0000', '') + \
- '::a89:3'
- del expected['/qubes-gateway6']
- vm.create_qdb_entries()
- self.assertEqual(test_qubesdb.data, expected)
- test_qubesdb.data.clear()
- with self.subTest('proxy_ipv4'):
- del vm.features['ipv6']
- expected['/name'] = 'test-inst-netvm'
- expected['/qubes-vm-type'] = 'NetVM'
- del expected['/qubes-ip']
- del expected['/qubes-gateway']
- del expected['/qubes-netmask']
- del expected['/qubes-ip6']
- del expected['/qubes-primary-dns']
- del expected['/qubes-secondary-dns']
- del expected['/qubes-mac']
- expected['/qubes-netvm-primary-dns'] = '10.139.1.1'
- expected['/qubes-netvm-secondary-dns'] = '10.139.1.2'
- expected['/qubes-netvm-network'] = '10.137.0.2'
- expected['/qubes-netvm-gateway'] = '10.137.0.2'
- expected['/qubes-netvm-netmask'] = '255.255.255.255'
- expected['/qubes-iptables-domainrules/3'] = \
- '*filter\n' \
- '-A FORWARD -s 10.137.0.3 -j ACCEPT\n' \
- '-A FORWARD -s 10.137.0.3 -j DROP\n' \
- 'COMMIT\n'
- expected['/mapped-ip/10.137.0.3/visible-ip'] = '10.137.0.3'
- expected['/mapped-ip/10.137.0.3/visible-gateway'] = '10.137.0.2'
- expected['/qubes-firewall/10.137.0.3'] = ''
- expected['/qubes-firewall/10.137.0.3/0000'] = 'action=accept'
- expected['/qubes-firewall/10.137.0.3/policy'] = 'drop'
- expected['/connected-ips'] = '10.137.0.3'
- with unittest.mock.patch('qubes.vm.qubesvm.QubesVM.is_running',
- lambda _: True):
- netvm.create_qdb_entries()
- self.assertEqual(test_qubesdb.data, expected)
- test_qubesdb.data.clear()
- with self.subTest('proxy_ipv6'):
- netvm.features['ipv6'] = True
- ip6 = qubes.config.qubes_ipv6_prefix.replace(
- ':0000', '') + '::a89:3'
- expected['/qubes-netvm-gateway6'] = ip6[:-1] + '2'
- expected['/qubes-firewall/' + ip6] = ''
- expected['/qubes-firewall/' + ip6 + '/0000'] = 'action=accept'
- expected['/qubes-firewall/' + ip6 + '/policy'] = 'drop'
- expected['/connected-ips6'] = ip6
- with unittest.mock.patch('qubes.vm.qubesvm.QubesVM.is_running',
- lambda _: True):
- netvm.create_qdb_entries()
- self.assertEqual(test_qubesdb.data, expected)
- @unittest.mock.patch('qubes.utils.get_timezone')
- @unittest.mock.patch('qubes.utils.urandom')
- @unittest.mock.patch('qubes.vm.qubesvm.QubesVM.untrusted_qdb')
- def test_622_qdb_guivm_keyboard_layout(self, mock_qubesdb, mock_urandom,
- mock_timezone):
- mock_urandom.return_value = b'A' * 64
- mock_timezone.return_value = 'UTC'
- template = self.get_vm(
- cls=qubes.vm.templatevm.TemplateVM, name='template')
- template.netvm = None
- guivm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=template,
- name='sys-gui', qid=2, provides_network=False)
- vm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=template,
- name='appvm', qid=3)
- vm.netvm = None
- vm.guivm = guivm
- guivm.features['keyboard-layout'] = 'fr'
- xkb_keymap = \
- 'xkb_keymap {\x0a\x09xkb_keycodes { include ' \
- '"evdev"\x09};\x0a\x09xkb_types { include ' \
- '"complete"\x09};\x0a\x09xkb_compat { include ' \
- '"complete"\x09};\x0a\x09xkb_symbols { include ' \
- '"pc+fr+inet(evdev)"\x09};\x0a\x09xkb_geometry ' \
- '{ include "pc(pc105)"\x09};\x0a};'
- guivm.is_running = lambda: True
- vm.events_enabled = True
- test_qubesdb = TestQubesDB()
- mock_qubesdb.write.side_effect = test_qubesdb.write
- mock_qubesdb.rm.side_effect = test_qubesdb.rm
- vm.create_qdb_entries()
- self.maxDiff = None
- self.assertEqual(test_qubesdb.data, {
- '/name': 'test-inst-appvm',
- '/type': 'AppVM',
- '/default-user': 'user',
- '/qubes-keyboard': xkb_keymap,
- '/keyboard-layout': 'fr',
- '/qubes-vm-type': 'AppVM',
- '/qubes-gui-domain-xid': '{}'.format(guivm.xid),
- '/qubes-debug-mode': '0',
- '/qubes-base-template': 'test-inst-template',
- '/qubes-timezone': 'UTC',
- '/qubes-random-seed': base64.b64encode(b'A' * 64),
- '/qubes-vm-persistence': 'rw-only',
- '/qubes-vm-updateable': 'False',
- '/qubes-block-devices': '',
- '/qubes-usb-devices': '',
- '/qubes-iptables': 'reload',
- '/qubes-iptables-error': '',
- '/qubes-iptables-header': unittest.mock.ANY,
- '/qubes-service/qubes-update-check': '0',
- '/qubes-service/meminfo-writer': '1',
- '/connected-ips': '',
- '/connected-ips6': '',
- })
- @unittest.mock.patch('qubes.utils.get_timezone')
- @unittest.mock.patch('qubes.utils.urandom')
- @unittest.mock.patch('qubes.vm.qubesvm.QubesVM.untrusted_qdb')
- def test_623_qdb_audiovm(self, mock_qubesdb, mock_urandom,
- mock_timezone):
- mock_urandom.return_value = b'A' * 64
- mock_timezone.return_value = 'UTC'
- template = self.get_vm(
- cls=qubes.vm.templatevm.TemplateVM, name='template')
- template.netvm = None
- audiovm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=template,
- name='sys-audio', qid=2, provides_network=False)
- vm = self.get_vm(cls=qubes.vm.appvm.AppVM, template=template,
- name='appvm', qid=3)
- vm.netvm = None
- vm.audiovm = audiovm
- audiovm.is_running = lambda: True
- vm.events_enabled = True
- test_qubesdb = TestQubesDB()
- mock_qubesdb.write.side_effect = test_qubesdb.write
- mock_qubesdb.rm.side_effect = test_qubesdb.rm
- vm.create_qdb_entries()
- self.maxDiff = None
- self.assertEqual(test_qubesdb.data, {
- '/name': 'test-inst-appvm',
- '/type': 'AppVM',
- '/default-user': 'user',
- '/qubes-vm-type': 'AppVM',
- '/qubes-audio-domain-xid': '{}'.format(audiovm.xid),
- '/qubes-debug-mode': '0',
- '/qubes-base-template': 'test-inst-template',
- '/qubes-timezone': 'UTC',
- '/qubes-random-seed': base64.b64encode(b'A' * 64),
- '/qubes-vm-persistence': 'rw-only',
- '/qubes-vm-updateable': 'False',
- '/qubes-block-devices': '',
- '/qubes-usb-devices': '',
- '/qubes-iptables': 'reload',
- '/qubes-iptables-error': '',
- '/qubes-iptables-header': unittest.mock.ANY,
- '/qubes-service/qubes-update-check': '0',
- '/qubes-service/meminfo-writer': '1',
- '/connected-ips': '',
- '/connected-ips6': '',
- })
- @asyncio.coroutine
- def coroutine_mock(self, mock, *args, **kwargs):
- return mock(*args, **kwargs)
- @unittest.mock.patch('asyncio.create_subprocess_exec')
- def test_700_run_service(self, mock_subprocess):
- func_mock = unittest.mock.Mock()
- mock_subprocess.side_effect = functools.partial(
- self.coroutine_mock, func_mock)
- start_mock = unittest.mock.Mock()
- vm = self.get_vm(cls=qubes.vm.standalonevm.StandaloneVM,
- name='vm')
- vm.is_running = lambda: True
- vm.is_qrexec_running = lambda: True
- vm.start = functools.partial(self.coroutine_mock, start_mock)
- with self.subTest('running'):
- self.loop.run_until_complete(vm.run_service('test.service'))
- func_mock.assert_called_once_with(
- '/usr/bin/qrexec-client', '-d', 'test-inst-vm',
- 'user:QUBESRPC test.service dom0')
- self.assertFalse(start_mock.called)
- func_mock.reset_mock()
- start_mock.reset_mock()
- with self.subTest('not_running'):
- vm.is_running = lambda: False
- with self.assertRaises(qubes.exc.QubesVMNotRunningError):
- self.loop.run_until_complete(vm.run_service('test.service'))
- self.assertFalse(func_mock.called)
- func_mock.reset_mock()
- start_mock.reset_mock()
- with self.subTest('autostart'):
- vm.is_running = lambda: False
- self.loop.run_until_complete(vm.run_service(
- 'test.service', autostart=True))
- func_mock.assert_called_once_with(
- '/usr/bin/qrexec-client', '-d', 'test-inst-vm',
- 'user:QUBESRPC test.service dom0')
- self.assertTrue(start_mock.called)
- func_mock.reset_mock()
- start_mock.reset_mock()
- with self.subTest('no_qrexec'):
- vm.is_running = lambda: True
- vm.is_qrexec_running = lambda: False
- with self.assertRaises(qubes.exc.QubesVMError):
- self.loop.run_until_complete(vm.run_service('test.service'))
- self.assertFalse(start_mock.called)
- self.assertFalse(func_mock.called)
- func_mock.reset_mock()
- start_mock.reset_mock()
- with self.subTest('other_user'):
- vm.is_running = lambda: True
- vm.is_qrexec_running = lambda: True
- self.loop.run_until_complete(vm.run_service('test.service',
- user='other'))
- func_mock.assert_called_once_with(
- '/usr/bin/qrexec-client', '-d', 'test-inst-vm',
- 'other:QUBESRPC test.service dom0')
- self.assertFalse(start_mock.called)
- func_mock.reset_mock()
- start_mock.reset_mock()
- with self.subTest('other_source'):
- vm.is_running = lambda: True
- vm.is_qrexec_running = lambda: True
- self.loop.run_until_complete(vm.run_service('test.service',
- source='test-inst-vm'))
- func_mock.assert_called_once_with(
- '/usr/bin/qrexec-client', '-d', 'test-inst-vm',
- 'user:QUBESRPC test.service test-inst-vm')
- self.assertFalse(start_mock.called)
- @unittest.mock.patch('qubes.vm.qubesvm.QubesVM.run_service')
- def test_710_run_service_for_stdio(self, mock_run_service):
- vm = self.get_vm(cls=qubes.vm.standalonevm.StandaloneVM,
- name='vm')
- func_mock = unittest.mock.Mock()
- mock_run_service.side_effect = functools.partial(
- self.coroutine_mock, func_mock)
- communicate_mock = unittest.mock.Mock()
- func_mock.return_value.communicate.side_effect = functools.partial(
- self.coroutine_mock, communicate_mock)
- communicate_mock.return_value = (b'stdout', b'stderr')
- func_mock.return_value.returncode = 0
- with self.subTest('default'):
- value = self.loop.run_until_complete(
- vm.run_service_for_stdio('test.service'))
- func_mock.assert_called_once_with(
- 'test.service',
- stdout=subprocess.PIPE,
- stderr=subprocess.PIPE,
- stdin=subprocess.PIPE)
- communicate_mock.assert_called_once_with(input=None)
- self.assertEqual(value, (b'stdout', b'stderr'))
- func_mock.reset_mock()
- communicate_mock.reset_mock()
- with self.subTest('with_input'):
- value = self.loop.run_until_complete(
- vm.run_service_for_stdio('test.service', input=b'abc'))
- func_mock.assert_called_once_with(
- 'test.service',
- stdout=subprocess.PIPE,
- stderr=subprocess.PIPE,
- stdin=subprocess.PIPE)
- communicate_mock.assert_called_once_with(input=b'abc')
- self.assertEqual(value, (b'stdout', b'stderr'))
- func_mock.reset_mock()
- communicate_mock.reset_mock()
- with self.subTest('error'):
- func_mock.return_value.returncode = 1
- with self.assertRaises(subprocess.CalledProcessError) as exc:
- self.loop.run_until_complete(
- vm.run_service_for_stdio('test.service'))
- func_mock.assert_called_once_with(
- 'test.service',
- stdout=subprocess.PIPE,
- stderr=subprocess.PIPE,
- stdin=subprocess.PIPE)
- communicate_mock.assert_called_once_with(input=None)
- self.assertEqual(exc.exception.returncode, 1)
- self.assertEqual(exc.exception.output, b'stdout')
- self.assertEqual(exc.exception.stderr, b'stderr')
- @unittest.mock.patch('os.path.exists')
- def test_720_is_fully_usable(self, mock_os_path_exists):
- vm_name = 'workvm'
- qrexec_file_name = '/var/run/qubes/qrexec.{}'.format(
- 'test-inst-{}'.format(vm_name))
- vm = self.get_vm(cls=qubes.vm.appvm.AppVM, name=vm_name)
- # Dummy xid; greater than 0 to indicate a running AppVM
- vm._qubesprop_xid = 10
- self.assertGreater(vm.xid, 0)
- with self.subTest('with_qrexec_started'):
- mock_os_path_exists.return_value = True
- vm.features['qrexec'] = True
- fully_usable = vm.is_fully_usable()
- mock_os_path_exists.assert_called_once_with(qrexec_file_name)
- self.assertEqual(fully_usable, True)
- mock_os_path_exists.reset_mock()
- with self.subTest('with_qrexec_error'):
- mock_os_path_exists.return_value = False
- vm.features['qrexec'] = True
- fully_usable = vm.is_fully_usable()
- mock_os_path_exists.assert_called_once_with(qrexec_file_name)
- self.assertEqual(fully_usable, False)
- mock_os_path_exists.reset_mock()
- with self.subTest('without_qrexec'):
- vm.features['qrexec'] = False
- fully_usable = vm.is_fully_usable()
- mock_os_path_exists.assert_not_called()
- self.assertEqual(fully_usable, True)
|