Skip to content

Commit aecd1b2

Browse files
author
Vít Šesták
committed
Refactroging – preparing for #42
1 parent 36c08ef commit aecd1b2

File tree

6 files changed

+79
-59
lines changed

6 files changed

+79
-59
lines changed

backup.py

+3-36
Original file line numberDiff line numberDiff line change
@@ -73,49 +73,16 @@ def action_backup(vm_info, config, session, args):
7373
vm_instance = vm_info.vm.instance_if_running()
7474
if vm_instance is not None:
7575
vm_instance.try_sync()
76-
volume_clone = vm.private_volume().clone("v6-qubes-backup-poc-cloned")
77-
try:
78-
backup_storage_vm = VmInstance(config.get_backup_storage_vm_name())
79-
with Dvm() as dvm:
80-
dvm.attach("xvdz", volume_clone) # --ro: 1. is not needed since it is a clone, 2. blocks repair procedures when mounting
81-
try:
82-
dvm.check_call("sudo mkdir /mnt/clone")
83-
dvm.check_call("sudo mount /dev/xvdz /mnt/clone") # TODO: consider -o nosuid,noexec – see issue #16
84-
try:
85-
backup_backend.upload_agent(dvm)
86-
with backup_backend.add_permissions(backup_storage_vm, dvm, vm_keys.encrypted_name):
87-
# run the agent
88-
with subprocess.Popen(dvm.create_command("/tmp/backup-agent "+shlex.quote(backup_storage_vm.get_name())+" "+shlex.quote(vm_keys.encrypted_name)), stdin = subprocess.PIPE) as proc:
89-
proc.stdin.write(vm_keys.key)
90-
proc.stdin.close()
91-
assert(proc.wait() == 0) # uarrgh, implemented by busy loop
92-
# TODO: also copy ~/.v6-qubes-backup-poc/master to the backup in order to make it recoverable without additional data (except password). See issue #12.
93-
finally: dvm.check_call("sudo umount /mnt/clone")
94-
finally: dvm.detach_all()
95-
finally: volume_clone.remove()
76+
backup_storage_vm = VmInstance(config.get_backup_storage_vm_name())
77+
backup_backend.backup_vm(vm, vm_keys, backup_storage_vm)
9678

9779
def action_restore(restored_vm_info, config, session, args):
9880
# Maybe type vm_info is not what I need here…
9981
new_name = args.vm_name_template.replace("%", restored_vm_info.vm.get_name())
100-
subprocess.check_call("qvm-create "+shlex.quote(new_name)+" "+args.qvm_create_args, shell=True)
101-
subprocess.check_call(["qvm-prefs", "-s", new_name, "netvm", "none"]) # Safe approach…
10282
new_vm = Vm(new_name)
10383
backup_backend = config.get_backup_backend()
10484
backup_storage_vm = VmInstance(config.get_backup_storage_vm_name())
105-
with Dvm() as dvm:
106-
dvm.attach("xvdz", new_vm.private_volume())
107-
try:
108-
dvm.check_call("sudo mkdir /mnt/clone")
109-
dvm.check_call("sudo mount /dev/xvdz /mnt/clone")
110-
try:
111-
backup_backend.upload_agent(dvm)
112-
with backup_backend.add_permissions(backup_storage_vm, dvm, restored_vm_info.vm_keys.encrypted_name):
113-
with subprocess.Popen(dvm.create_command("/tmp/restore-agent "+shlex.quote(backup_storage_vm.get_name())+" "+shlex.quote(restored_vm_info.vm_keys.encrypted_name)), stdin = subprocess.PIPE) as proc:
114-
proc.stdin.write(restored_vm_info.vm_keys.key)
115-
proc.stdin.close()
116-
assert(proc.wait() == 0) # uarrgh, implemented by busy loop
117-
finally: dvm.check_call("sudo umount /mnt/clone")
118-
finally: dvm.detach_all()
85+
backup_backend.restore_vm(new_vm, new_name, args.qvm_create_args, restored_vm_info.vm_keys, backup_storage_vm)
11986

12087
def action_show_vm_keys(vm_info, config, session, args):
12188
print(vm_info.vm_keys.encrypted_name+": "+base64.b64encode(vm_info.vm_keys.key).decode("ascii"))

backupbackends/basic.py

+24
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
from base64 import b64encode
2+
import shlex
3+
4+
# If you want to implement another backend, you can, but maybe you should wait a while until the API becomes more stable.
5+
# TODO: document interface
6+
class BackupBackend:
7+
8+
# TODO: Move elsewhere. This will be done as part of backupbackend-agnostic backup storage within #37
9+
def add_permissions(self, backup_storage_vm, dvm, encrypted_name):
10+
permission_file = "/var/run/v6-qubes-backup-poc-permissions/"+b64encode(dvm.get_name().encode("ascii")).decode("ascii")
11+
return _DuplicityPermissionsContext(backup_storage_vm, encrypted_name, permission_file)
12+
13+
14+
class _DuplicityPermissionsContext:
15+
def __init__(self, backup_storage_vm, encrypted_name, permission_file):
16+
self.permission_file = permission_file
17+
self.backup_storage_vm = backup_storage_vm
18+
self.encrypted_name = encrypted_name
19+
def __enter__(self):
20+
self.backup_storage_vm.check_call("sudo mkdir -p /var/run/v6-qubes-backup-poc-permissions")
21+
self.backup_storage_vm.check_call("echo -n "+shlex.quote(self.encrypted_name)+" | sudo tee "+shlex.quote(self.permission_file)+".ip")
22+
self.backup_storage_vm.check_call("sudo mv "+shlex.quote(self.permission_file)+".ip "+shlex.quote(self.permission_file)) # This way prevents race condition. I know, this is not the best approach for duraility, but that's not what we need. (Especially if those files don't survive reboot.)
23+
def __exit__(self, type, value, traceback):
24+
self.backup_storage_vm.check_call("sudo rm "+shlex.quote(self.permission_file)) # remove permissions (not strictly needed for security, just hygiene)

backupbackends/duplicity.py

+5-19
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
import subprocess
44
import shlex
55
import base64
6+
from .dvmbased import DvmBasedBackupBackend
67

78
# I know this is duplicated code, but sharing the same code between Python 2 and Python 3 would be probably hell.
89

@@ -44,9 +45,7 @@ def read_safe_filename(inp):
4445
return sanitize_filename(read_until_zero(inp, 255).decode("ascii"))
4546

4647

47-
# If you want to implement another backend, you can, but maybe you should wait a while until the API becomes more stable.
48-
# TODO: document interface
49-
class DuplicityBackupBackend:
48+
class DuplicityBackupBackend(DvmBasedBackupBackend):
5049
base_path = os.path.dirname(os.path.realpath(__file__))+"/duplicity-vm-files/"
5150
def upload_agent(self, vm):
5251
with open(self.base_path+"vm-backup-agent", "rb") as inp:
@@ -61,7 +60,9 @@ def upload_agent(self, vm):
6160
vm.check_call("sudo mkdir /usr/lib/python2.7/dist-packages/duplicity/backends/qubesintervmbackendprivate")
6261
vm.check_call("sudo touch /usr/lib/python2.7/dist-packages/duplicity/backends/qubesintervmbackendprivate/__init__.py")
6362
vm.check_call("sudo tee /usr/lib/python2.7/dist-packages/duplicity/backends/qubesintervmbackendprivate/common.py", stdin = inp)
64-
63+
64+
# TODO: Move methods below to backupbackend-agnostic backup storage handler:
65+
6566
def install_dom0(self, vm):
6667
subprocess.check_call("echo "+shlex.quote("$anyvm "+vm.get_name()+" allow")+" | sudo tee /etc/qubes-rpc/policy/v6ak.QubesInterVmBackupStorage", shell=True, stdout=subprocess.DEVNULL)
6768

@@ -77,10 +78,6 @@ def install_backup_storage_vm(self, vm):
7778
# FIXME: Don't be so aggressive!
7879
vm.check_call("sudo tee /usr/local/share/v6-qubes-backup-poc/common.py", stdin = inp)
7980

80-
def add_permissions(self, backup_storage_vm, dvm, encrypted_name):
81-
permission_file = "/var/run/v6-qubes-backup-poc-permissions/"+base64.b64encode(dvm.get_name().encode("ascii")).decode("ascii")
82-
return _DuplicityPermissionsContext(backup_storage_vm, encrypted_name, permission_file)
83-
8481
def list_backups(self, backup_storage_vm):
8582
vms = []
8683
with backup_storage_vm.popen("/usr/local/share/v6-qubes-backup-poc/list-backups.py", stdout = subprocess.PIPE) as proc:
@@ -94,14 +91,3 @@ def list_backups(self, backup_storage_vm):
9491
else:
9592
raise Exception("Unexpected character #"+str(ord(c)))
9693

97-
class _DuplicityPermissionsContext:
98-
def __init__(self, backup_storage_vm, encrypted_name, permission_file):
99-
self.permission_file = permission_file
100-
self.backup_storage_vm = backup_storage_vm
101-
self.encrypted_name = encrypted_name
102-
def __enter__(self):
103-
self.backup_storage_vm.check_call("sudo mkdir -p /var/run/v6-qubes-backup-poc-permissions")
104-
self.backup_storage_vm.check_call("echo -n "+shlex.quote(self.encrypted_name)+" | sudo tee "+shlex.quote(self.permission_file)+".ip")
105-
self.backup_storage_vm.check_call("sudo mv "+shlex.quote(self.permission_file)+".ip "+shlex.quote(self.permission_file)) # This way prevents race condition. I know, this is not the best approach for duraility, but that's not what we need. (Especially if those files don't survive reboot.)
106-
def __exit__(self, type, value, traceback):
107-
self.backup_storage_vm.check_call("sudo rm "+shlex.quote(self.permission_file)) # remove permissions (not strictly needed for security, just hygiene)

backupbackends/dvmbased.py

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
from qubesvmtools import Dvm
2+
import shlex
3+
import subprocess
4+
from .basic import BackupBackend
5+
6+
class DvmBasedBackupBackend(BackupBackend):
7+
def backup_vm(self, vm, vm_keys, backup_storage_vm):
8+
volume_clone = vm.private_volume().clone("v6-qubes-backup-poc-cloned")
9+
try:
10+
with Dvm() as dvm:
11+
dvm.attach("xvdz", volume_clone) # --ro: 1. is not needed since it is a clone, 2. blocks repair procedures when mounting
12+
try:
13+
dvm.check_call("sudo mkdir /mnt/clone")
14+
dvm.check_call("sudo mount /dev/xvdz /mnt/clone") # TODO: consider -o nosuid,noexec – see issue #16
15+
try:
16+
self.upload_agent(dvm)
17+
with self.add_permissions(backup_storage_vm, dvm, vm_keys.encrypted_name):
18+
dvm.check_call("/tmp/backup-agent "+shlex.quote(backup_storage_vm.get_name())+" "+shlex.quote(vm_keys.encrypted_name), input = vm_keys.key, stdout = None, stderr = None)
19+
finally: dvm.check_call("sudo umount /mnt/clone")
20+
finally: dvm.detach_all()
21+
finally: volume_clone.remove()
22+
23+
def restore_vm(self, new_vm, new_name, qvm_create_args, vm_keys, backup_storage_vm):
24+
subprocess.check_call("qvm-create "+shlex.quote(new_name)+" "+qvm_create_args, shell=True)
25+
subprocess.check_call(["qvm-prefs", "-s", new_name, "netvm", "none"]) # Safe approach…
26+
with Dvm() as dvm:
27+
dvm.attach("xvdz", new_vm.private_volume())
28+
try:
29+
dvm.check_call("sudo mkdir /mnt/clone")
30+
dvm.check_call("sudo mount /dev/xvdz /mnt/clone")
31+
try:
32+
self.upload_agent(dvm)
33+
with self.add_permissions(backup_storage_vm, dvm, vm_keys.encrypted_name):
34+
dvm.check_call("/tmp/restore-agent "+shlex.quote(backup_storage_vm.get_name())+" "+shlex.quote(vm_keys.encrypted_name), input = vm_keys.key, stdout = None, stderr = None)
35+
finally: dvm.check_call("sudo umount /mnt/clone")
36+
finally: dvm.detach_all()
37+
38+
# abstract def upload_agent(self, dvm)
39+

qubesvmtools.py

+5-4
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# python3
22
import subprocess
3-
from subprocess import Popen
3+
from subprocess import Popen, DEVNULL
44
import re
55
from pathlib import Path
66
import os
@@ -10,7 +10,7 @@ class Vm:
1010
def __init__(self, name):
1111
pattern = re.compile("\\A[a-zA-Z0-9-]+\\Z")
1212
if not pattern.match(name):
13-
raise Exception("bad name")
13+
raise Exception("bad name: "+name)
1414
self.name = name
1515
def is_running(self):
1616
ret = subprocess.call(["qvm-check", "--running", self.name], stdout=subprocess.DEVNULL)
@@ -66,17 +66,18 @@ def try_sync(self):
6666
pass
6767
def sync(self):
6868
self.check_call("sync") # TODO: Sync in more universal way. See #46
69-
def check_call(self, command, stdin = None, input = None):
69+
def check_call(self, command, stdin = None, input = None, stdout = DEVNULL, stderr = DEVNULL):
7070
if stdin == None:
7171
stdin_type = subprocess.PIPE
7272
elif input == None:
7373
stdin_type = stdin
7474
else:
7575
raise Exception("cannot handle both stdin and input")
7676
command_native = self.create_command(command)
77-
with Popen(command_native, stdin = stdin_type, stdout = subprocess.DEVNULL, stderr = subprocess.DEVNULL) as proc:
77+
with Popen(command_native, stdin = stdin_type, stdout = stdout, stderr = stderr) as proc:
7878
if input is not None:
7979
proc.stdin.write(input)
80+
proc.stdin.close()
8081
ret = proc.wait()
8182
if ret != 0:
8283
raise subprocess.CalledProcessError(ret, command_native)

upload.sh

+3
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ set -o pipefail
99
PACK=(
1010
backup backup.py
1111
install-backup-storage-vm install-backup-storage-vm.py
12+
backupbackends/basic.py
13+
backupbackends/dvmbased.py
1214
backupbackends/duplicity.py
1315
backupbackends/duplicity-vm-files/vm-backup-agent
1416
backupbackends/duplicity-vm-files/vm-restore-agent
@@ -30,6 +32,7 @@ IGNORE=(
3032
__pycache__
3133
backupbackends/__pycache__
3234
tests/__pycache__
35+
backupbackends/qvmbackup.py.notdone
3336
)
3437

3538
if ! diff <(find "${PACK[@]}" "${IGNORE[@]}" -type f -or -type l | sort) <(find -type f -or -type l | sed 's#^\./##' | sort); then

0 commit comments

Comments
 (0)