123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377 |
- #
- # The Qubes OS Project, https://www.qubes-os.org/
- #
- # Copyright (C) 2015 Bahtiar `kalkin-` Gadimov <bahtiar@gadimov.de>
- #
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation; either version 2 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License along
- # with this program; if not, write to the Free Software Foundation, Inc.,
- # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- #
- ''' Tests for the file storage backend '''
- import os
- import shutil
- import qubes.storage
- import qubes.tests.storage
- from qubes.config import defaults
- # :pylint: disable=invalid-name
- class TestApp(qubes.Qubes):
- ''' A Mock App object '''
- def __init__(self, *args, **kwargs): # pylint: disable=unused-argument
- super(TestApp, self).__init__('/tmp/qubes-test.xml', load=False,
- offline_mode=True, **kwargs)
- self.load_initial_values()
- self.pools['linux-kernel'].dir_path = '/tmp/qubes-test-kernel'
- dummy_kernel = os.path.join(self.pools['linux-kernel'].dir_path,
- 'dummy')
- os.makedirs(dummy_kernel)
- open(os.path.join(dummy_kernel, 'vmlinuz'), 'w').close()
- open(os.path.join(dummy_kernel, 'modules.img'), 'w').close()
- open(os.path.join(dummy_kernel, 'initramfs'), 'w').close()
- self.default_kernel = 'dummy'
- def cleanup(self):
- ''' Remove temporary directories '''
- shutil.rmtree(self.pools['linux-kernel'].dir_path)
- def create_dummy_template(self):
- ''' Initalizes a dummy TemplateVM as the `default_template` '''
- template = self.add_new_vm(qubes.vm.templatevm.TemplateVM,
- name='test-template', label='red',
- memory=1024, maxmem=1024)
- self.default_template = template
- class TC_00_FilePool(qubes.tests.QubesTestCase):
- """ This class tests some properties of the 'default' pool.
- This test might become obsolete if we change the driver for the default
- pool to something else as 'file'.
- """
- def setUp(self):
- super(TC_00_FilePool, self).setUp()
- self.app = TestApp()
- def tearDown(self):
- self.app.cleanup()
- super(TC_00_FilePool, self).tearDown()
- def test000_default_pool_dir(self):
- """ The predefined dir for the default pool should be ``/var/lib/qubes``
- .. sealso::
- Data :data:``qubes.qubes.defaults['pool_config']``.
- """
- result = self.app.get_pool("default").dir_path
- expected = '/var/lib/qubes'
- self.assertEquals(result, expected)
- def test001_default_storage_class(self):
- """ Check when using default pool the Storage is
- ``qubes.storage.Storage``. """
- result = self._init_app_vm().storage
- self.assertIsInstance(result, qubes.storage.Storage)
- def _init_app_vm(self):
- """ Return initalised, but not created, AppVm. """
- vmname = self.make_vm_name('appvm')
- self.app.create_dummy_template()
- return self.app.add_new_vm(qubes.vm.appvm.AppVM, name=vmname,
- template=self.app.default_template,
- label='red')
- class TC_01_FileVolumes(qubes.tests.QubesTestCase):
- ''' Test correct handling of different types of volumes '''
- POOL_DIR = '/tmp/test-pool'
- POOL_NAME = 'test-pool'
- POOL_CONF = {'driver': 'file', 'dir_path': POOL_DIR, 'name': POOL_NAME}
- def setUp(self):
- """ Add a test file based storage pool """
- super(TC_01_FileVolumes, self).setUp()
- self.app = TestApp()
- self.app.create_dummy_template()
- self.app.add_pool(**self.POOL_CONF)
- def tearDown(self):
- """ Remove the file based storage pool after testing """
- self.app.remove_pool("test-pool")
- self.app.cleanup()
- super(TC_01_FileVolumes, self).tearDown()
- shutil.rmtree(self.POOL_DIR, ignore_errors=True)
- def test_000_origin_volume(self):
- config = {
- 'name': 'root',
- 'pool': self.POOL_NAME,
- 'save_on_stop': True,
- 'rw': True,
- 'size': defaults['root_img_size'],
- }
- vm = qubes.tests.storage.TestVM(self)
- volume = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
- self.assertEqual(volume.name, 'root')
- self.assertEqual(volume.pool, self.POOL_NAME)
- self.assertEqual(volume.size, defaults['root_img_size'])
- self.assertFalse(volume.snap_on_start)
- self.assertTrue(volume.save_on_stop)
- self.assertTrue(volume.rw)
- def test_001_snapshot_volume(self):
- source = 'vm-templates/fedora-23/root'
- original_size = qubes.config.defaults['root_img_size']
- config = {
- 'name': 'root',
- 'pool': 'default',
- 'snap_on_start': True,
- 'rw': False,
- 'source': source,
- 'size': original_size,
- }
- template_vm = self.app.default_template
- vm = qubes.tests.storage.TestVM(self, template=template_vm)
- volume = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
- self.assertEqual(volume.name, 'root')
- self.assertEqual(volume.pool, 'default')
- self.assertEqual(volume.size, original_size)
- self.assertTrue(volume.snap_on_start)
- self.assertTrue(volume.snap_on_start)
- self.assertFalse(volume.save_on_stop)
- self.assertFalse(volume.rw)
- self.assertEqual(volume.usage, 0)
- def test_002_read_write_volume(self):
- config = {
- 'name': 'root',
- 'pool': self.POOL_NAME,
- 'rw': True,
- 'save_on_stop': True,
- 'size': defaults['root_img_size'],
- }
- vm = qubes.tests.storage.TestVM(self)
- volume = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
- self.assertEqual(volume.name, 'root')
- self.assertEqual(volume.pool, self.POOL_NAME)
- self.assertEqual(volume.size, defaults['root_img_size'])
- self.assertFalse(volume.snap_on_start)
- self.assertTrue(volume.save_on_stop)
- self.assertTrue(volume.rw)
- def test_003_read_only_volume(self):
- template = self.app.default_template
- vid = template.volumes['root'].vid
- config = {'name': 'root', 'pool': 'default', 'rw': False, 'vid': vid}
- vm = qubes.tests.storage.TestVM(self, template=template)
- volume = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
- self.assertEqual(volume.name, 'root')
- self.assertEqual(volume.pool, 'default')
- # original_size = qubes.config.defaults['root_img_size']
- # FIXME: self.assertEqual(volume.size, original_size)
- self.assertFalse(volume.snap_on_start)
- self.assertFalse(volume.save_on_stop)
- self.assertFalse(volume.rw)
- def test_004_volatile_volume(self):
- config = {
- 'name': 'root',
- 'pool': self.POOL_NAME,
- 'size': defaults['root_img_size'],
- 'rw': True,
- }
- vm = qubes.tests.storage.TestVM(self)
- volume = self.app.get_pool(self.POOL_NAME).init_volume(vm, config)
- self.assertEqual(volume.name, 'root')
- self.assertEqual(volume.pool, self.POOL_NAME)
- self.assertEqual(volume.size, defaults['root_img_size'])
- self.assertFalse(volume.snap_on_start)
- self.assertFalse(volume.save_on_stop)
- self.assertTrue(volume.rw)
- def test_005_appvm_volumes(self):
- ''' Check if AppVM volumes are propertly initialized '''
- vmname = self.make_vm_name('appvm')
- vm = self.app.add_new_vm(qubes.vm.appvm.AppVM, name=vmname,
- template=self.app.default_template,
- label='red')
- expected = vm.template.dir_path + '/root.img:' + vm.template.dir_path \
- + '/root-cow.img:' + vm.dir_path + '/root-cow.img'
- self.assertVolumePath(vm, 'root', expected, rw=False)
- expected = vm.dir_path + '/private.img:' + \
- vm.dir_path + '/private-cow.img'
- self.assertVolumePath(vm, 'private', expected, rw=True)
- expected = vm.dir_path + '/volatile.img'
- self.assertVolumePath(vm, 'volatile', expected, rw=True)
- def test_006_template_volumes(self):
- ''' Check if TemplateVM volumes are propertly initialized '''
- vmname = self.make_vm_name('appvm')
- vm = self.app.add_new_vm(qubes.vm.templatevm.TemplateVM, name=vmname,
- label='red')
- expected = vm.dir_path + '/root.img:' + vm.dir_path + '/root-cow.img'
- self.assertVolumePath(vm, 'root', expected, rw=True)
- expected = vm.dir_path + '/private.img'
- self.assertVolumePath(vm, 'private', expected, rw=True)
- expected = vm.dir_path + '/volatile.img'
- self.assertVolumePath(vm, 'volatile', expected, rw=True)
- def assertVolumePath(self, vm, dev_name, expected, rw=True):
- # :pylint: disable=invalid-name
- volumes = vm.volumes
- b_dev = volumes[dev_name].block_device()
- self.assertEqual(b_dev.rw, rw)
- self.assertEquals(b_dev.path, expected)
- class TC_03_FilePool(qubes.tests.QubesTestCase):
- """ Test the paths for the default file based pool (``FilePool``).
- """
- POOL_DIR = '/tmp/test-pool'
- APPVMS_DIR = '/tmp/test-pool/appvms'
- TEMPLATES_DIR = '/tmp/test-pool/vm-templates'
- SERVICE_DIR = '/tmp/test-pool/servicevms'
- POOL_NAME = 'test-pool'
- POOL_CONFIG = {'driver': 'file', 'dir_path': POOL_DIR, 'name': POOL_NAME}
- def setUp(self):
- """ Add a test file based storage pool """
- super(TC_03_FilePool, self).setUp()
- self._orig_qubes_base_dir = qubes.config.system_path['qubes_base_dir']
- qubes.config.system_path['qubes_base_dir'] = '/tmp/qubes-test'
- self.app = TestApp()
- self.app.create_dummy_template()
- self.app.add_pool(**self.POOL_CONFIG)
- def tearDown(self):
- """ Remove the file based storage pool after testing """
- self.app.remove_pool("test-pool")
- self.app.cleanup()
- super(TC_03_FilePool, self).tearDown()
- shutil.rmtree(self.POOL_DIR, ignore_errors=True)
- if os.path.exists('/tmp/qubes-test'):
- shutil.rmtree('/tmp/qubes-test')
- qubes.config.system_path['qubes_base_dir'] = self._orig_qubes_base_dir
- def test_001_pool_exists(self):
- """ Check if the storage pool was added to the storage pool config """
- self.assertIn('test-pool', self.app.pools.keys())
- def test_002_pool_dir_create(self):
- """ Check if the storage pool dir and subdirs were created """
- # The dir should not exists before
- pool_name = 'foo'
- pool_dir = '/tmp/foo'
- appvms_dir = '/tmp/foo/appvms'
- templates_dir = '/tmp/foo/vm-templates'
- self.assertFalse(os.path.exists(pool_dir))
- self.app.add_pool(name=pool_name, dir_path=pool_dir, driver='file')
- self.assertTrue(os.path.exists(pool_dir))
- self.assertTrue(os.path.exists(appvms_dir))
- self.assertTrue(os.path.exists(templates_dir))
- shutil.rmtree(pool_dir, ignore_errors=True)
- def test_011_appvm_file_images(self):
- """ Check if all the needed image files are created for an AppVm"""
- vmname = self.make_vm_name('appvm')
- vm = self.app.add_new_vm(qubes.vm.appvm.AppVM, name=vmname,
- template=self.app.default_template,
- volume_config={
- 'private': {
- 'pool': 'test-pool'
- },
- 'volatile': {
- 'pool': 'test-pool'
- }
- }, label='red')
- vm.create_on_disk()
- expected_vmdir = os.path.join(self.APPVMS_DIR, vm.name)
- expected_private_path = os.path.join(expected_vmdir, 'private.img')
- self.assertEquals(vm.volumes['private'].path, expected_private_path)
- expected_volatile_path = os.path.join(expected_vmdir, 'volatile.img')
- vm.storage.get_pool(vm.volumes['volatile'])\
- .reset(vm.volumes['volatile'])
- self.assertEqualsAndExists(vm.volumes['volatile'].path,
- expected_volatile_path)
- def test_013_template_file_images(self):
- """ Check if root.img, private.img, volatile.img and root-cow.img are
- created propertly by the storage system
- """
- vmname = self.make_vm_name('tmvm')
- vm = self.app.add_new_vm(qubes.vm.templatevm.TemplateVM, name=vmname,
- volume_config={
- 'root': {
- 'pool': 'test-pool'
- },
- 'private': {
- 'pool': 'test-pool'
- },
- 'volatile': {
- 'pool': 'test-pool'
- }
- }, label='red')
- vm.create_on_disk()
- expected_vmdir = os.path.join(self.TEMPLATES_DIR, vm.name)
- expected_root_origin_path = os.path.join(expected_vmdir, 'root.img')
- expected_root_cow_path = os.path.join(expected_vmdir, 'root-cow.img')
- expected_root_path = '%s:%s' % (expected_root_origin_path,
- expected_root_cow_path)
- self.assertEquals(vm.volumes['root'].block_device().path,
- expected_root_path)
- self.assertExist(vm.volumes['root'].path)
- expected_private_path = os.path.join(expected_vmdir, 'private.img')
- self.assertEqualsAndExists(vm.volumes['private'].path,
- expected_private_path)
- expected_rootcow_path = os.path.join(expected_vmdir, 'root-cow.img')
- self.assertEqualsAndExists(vm.volumes['root'].path_cow,
- expected_rootcow_path)
- def assertEqualsAndExists(self, result_path, expected_path):
- """ Check if the ``result_path``, matches ``expected_path`` and exists.
- See also: :meth:``assertExist``
- """
- # :pylint: disable=invalid-name
- self.assertEquals(result_path, expected_path)
- self.assertExist(result_path)
- def assertExist(self, path):
- """ Assert that the given path exists. """
- # :pylint: disable=invalid-name
- self.assertTrue(
- os.path.exists(path), "Path {!s} does not exist".format(path))
|