0c939329c5
Adds non-secure boot scenario and stateless firmware scenario to demonstrate how guest xml contents look like when firmware files are selected by libvirt. Partially-Implements: blueprint libvirt-firmware-auto-selection Change-Id: I88f0b81c8455630145efca8c6349fc00a0c29835 Signed-off-by: Takashi Kajinami <kajinamit@oss.nttdata.com>
312 lines
11 KiB
Python
312 lines
11 KiB
Python
# Copyright (C) 2021 Red Hat, Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import datetime
|
|
import re
|
|
|
|
from lxml import etree
|
|
from oslo_log import log as logging
|
|
from oslo_utils.fixture import uuidsentinel as uuids
|
|
|
|
import nova.conf
|
|
from nova import context as nova_context
|
|
from nova import objects
|
|
from nova.tests.functional.libvirt import base
|
|
|
|
CONF = nova.conf.CONF
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class UEFIServersTest(base.ServersTestBase):
|
|
|
|
def assertInstanceHasUEFI(
|
|
self, server, secure_boot=False, stateless=False
|
|
):
|
|
ctx = nova_context.get_admin_context()
|
|
instance = objects.Instance.get_by_uuid(ctx, server['id'])
|
|
self.assertIn('image_hw_machine_type', instance.system_metadata)
|
|
self.assertEqual(
|
|
'q35', instance.system_metadata['image_hw_machine_type'])
|
|
self.assertIn('image_hw_firmware_type', instance.system_metadata)
|
|
self.assertEqual(
|
|
'uefi', instance.system_metadata['image_hw_firmware_type'])
|
|
|
|
if secure_boot:
|
|
self.assertIn('image_os_secure_boot', instance.system_metadata)
|
|
self.assertEqual(
|
|
'required', instance.system_metadata['image_os_secure_boot'])
|
|
else:
|
|
self.assertNotIn('image_os_secure_boot', instance.system_metadata)
|
|
|
|
if stateless:
|
|
self.assertIn('image_hw_firmware_stateless',
|
|
instance.system_metadata)
|
|
self.assertTrue(
|
|
instance.system_metadata['image_hw_firmware_stateless'])
|
|
else:
|
|
self.assertNotIn('image_hw_firmware_stateless',
|
|
instance.system_metadata)
|
|
|
|
def test_create_server(self):
|
|
orig_create = nova.virt.libvirt.guest.Guest.create
|
|
|
|
def fake_create(cls, xml, host):
|
|
xml = re.sub('type arch.*machine',
|
|
'type machine', xml)
|
|
tree = etree.fromstring(xml)
|
|
self.assertXmlEqual(
|
|
"""
|
|
<os>
|
|
<type machine='q35'>hvm</type>
|
|
<loader type='pflash' readonly='yes' secure='no'>/usr/share/OVMF/OVMF_CODE.fd</loader>
|
|
<nvram template='/usr/share/OVMF/OVMF_VARS.fd'/>
|
|
<boot dev='hd'/>
|
|
<smbios mode='sysinfo'/>
|
|
</os>
|
|
""", # noqa: E501
|
|
etree.tostring(tree.find('./os'), encoding='unicode'))
|
|
|
|
return orig_create(xml, host)
|
|
|
|
self.stub_out('nova.virt.libvirt.guest.Guest.create', fake_create)
|
|
|
|
compute = self.start_compute()
|
|
|
|
# ensure we are reporting the correct trait
|
|
traits = self._get_provider_traits(self.compute_rp_uuids[compute])
|
|
self.assertIn('COMPUTE_SECURITY_UEFI_SECURE_BOOT', traits)
|
|
|
|
# create a server with UEFI and secure boot
|
|
timestamp = datetime.datetime(
|
|
2021, 1, 2, 3, 4, 5, tzinfo=datetime.timezone.utc
|
|
)
|
|
uefi_image = {
|
|
'id': uuids.uefi_image,
|
|
'name': 'uefi_image',
|
|
'created_at': timestamp,
|
|
'updated_at': timestamp,
|
|
'deleted_at': None,
|
|
'deleted': False,
|
|
'status': 'active',
|
|
'is_public': False,
|
|
'container_format': 'ova',
|
|
'disk_format': 'vhd',
|
|
'size': 74185822,
|
|
'min_ram': 0,
|
|
'min_disk': 0,
|
|
'protected': False,
|
|
'visibility': 'public',
|
|
'tags': [],
|
|
'properties': {
|
|
'hw_machine_type': 'q35',
|
|
'hw_firmware_type': 'uefi',
|
|
}
|
|
}
|
|
self.glance.create(None, uefi_image)
|
|
|
|
server = self._create_server(image_uuid=uuids.uefi_image)
|
|
|
|
# ensure our instance's system_metadata field is correct
|
|
self.assertInstanceHasUEFI(server)
|
|
|
|
def test_create_server_secure_boot(self):
|
|
orig_create = nova.virt.libvirt.guest.Guest.create
|
|
|
|
def fake_create(cls, xml, host):
|
|
xml = re.sub('type arch.*machine',
|
|
'type machine', xml)
|
|
tree = etree.fromstring(xml)
|
|
self.assertXmlEqual(
|
|
"""
|
|
<os>
|
|
<type machine='q35'>hvm</type>
|
|
<loader type='pflash' readonly='yes' secure='yes'>/usr/share/OVMF/OVMF_CODE.secboot.fd</loader>
|
|
<nvram template='/usr/share/OVMF/OVMF_VARS.secboot.fd'/>
|
|
<boot dev='hd'/>
|
|
<smbios mode='sysinfo'/>
|
|
</os>
|
|
""", # noqa: E501
|
|
etree.tostring(tree.find('./os'), encoding='unicode'))
|
|
|
|
return orig_create(xml, host)
|
|
|
|
self.stub_out('nova.virt.libvirt.guest.Guest.create', fake_create)
|
|
|
|
compute = self.start_compute()
|
|
|
|
# ensure we are reporting the correct trait
|
|
traits = self._get_provider_traits(self.compute_rp_uuids[compute])
|
|
self.assertIn('COMPUTE_SECURITY_UEFI_SECURE_BOOT', traits)
|
|
|
|
# create a server with UEFI and secure boot
|
|
timestamp = datetime.datetime(
|
|
2021, 1, 2, 3, 4, 5, tzinfo=datetime.timezone.utc
|
|
)
|
|
sb_image = {
|
|
'id': uuids.sb_image,
|
|
'name': 'sb_image',
|
|
'created_at': timestamp,
|
|
'updated_at': timestamp,
|
|
'deleted_at': None,
|
|
'deleted': False,
|
|
'status': 'active',
|
|
'is_public': False,
|
|
'container_format': 'ova',
|
|
'disk_format': 'vhd',
|
|
'size': 74185822,
|
|
'min_ram': 0,
|
|
'min_disk': 0,
|
|
'protected': False,
|
|
'visibility': 'public',
|
|
'tags': [],
|
|
'properties': {
|
|
'hw_machine_type': 'q35',
|
|
'hw_firmware_type': 'uefi',
|
|
'os_secure_boot': 'required',
|
|
}
|
|
}
|
|
self.glance.create(None, sb_image)
|
|
|
|
server = self._create_server(image_uuid=uuids.sb_image)
|
|
|
|
# ensure our instance's system_metadata field is correct
|
|
self.assertInstanceHasUEFI(server, secure_boot=True)
|
|
|
|
def test_create_server_stateless(self):
|
|
orig_create = nova.virt.libvirt.guest.Guest.create
|
|
|
|
def fake_create(cls, xml, host):
|
|
xml = re.sub('type arch.*machine',
|
|
'type machine', xml)
|
|
tree = etree.fromstring(xml)
|
|
self.assertXmlEqual(
|
|
"""
|
|
<os>
|
|
<type machine='q35'>hvm</type>
|
|
<loader type='pflash' readonly='yes' secure='no' stateless='yes'>/usr/share/OVMF/OVMF_CODE.fd</loader>
|
|
<boot dev='hd'/>
|
|
<smbios mode='sysinfo'/>
|
|
</os>
|
|
""", # noqa: E501
|
|
etree.tostring(tree.find('./os'), encoding='unicode'))
|
|
|
|
return orig_create(xml, host)
|
|
|
|
self.stub_out('nova.virt.libvirt.guest.Guest.create', fake_create)
|
|
|
|
compute = self.start_compute(libvirt_version=8006000)
|
|
|
|
# ensure we are reporting the correct trait
|
|
traits = self._get_provider_traits(self.compute_rp_uuids[compute])
|
|
self.assertIn('COMPUTE_SECURITY_STATELESS_FIRMWARE', traits)
|
|
|
|
# create a server with UEFI and secure boot
|
|
timestamp = datetime.datetime(
|
|
2021, 1, 2, 3, 4, 5, tzinfo=datetime.timezone.utc
|
|
)
|
|
stateless_image = {
|
|
'id': uuids.stateless_image,
|
|
'name': 'stateless_image',
|
|
'created_at': timestamp,
|
|
'updated_at': timestamp,
|
|
'deleted_at': None,
|
|
'deleted': False,
|
|
'status': 'active',
|
|
'is_public': False,
|
|
'container_format': 'ova',
|
|
'disk_format': 'vhd',
|
|
'size': 74185822,
|
|
'min_ram': 0,
|
|
'min_disk': 0,
|
|
'protected': False,
|
|
'visibility': 'public',
|
|
'tags': [],
|
|
'properties': {
|
|
'hw_machine_type': 'q35',
|
|
'hw_firmware_type': 'uefi',
|
|
'hw_firmware_stateless': True,
|
|
}
|
|
}
|
|
self.glance.create(None, stateless_image)
|
|
|
|
server = self._create_server(image_uuid=uuids.stateless_image)
|
|
|
|
# ensure our instance's system_metadata field is correct
|
|
self.assertInstanceHasUEFI(server, stateless=True)
|
|
|
|
def test_create_server_secure_boot_stateless(self):
|
|
orig_create = nova.virt.libvirt.guest.Guest.create
|
|
|
|
def fake_create(cls, xml, host):
|
|
xml = re.sub('type arch.*machine',
|
|
'type machine', xml)
|
|
tree = etree.fromstring(xml)
|
|
self.assertXmlEqual(
|
|
"""
|
|
<os>
|
|
<type machine='q35'>hvm</type>
|
|
<loader type='pflash' readonly='yes' secure='yes' stateless='yes'>/usr/share/OVMF/OVMF_CODE.secboot.fd</loader>
|
|
<boot dev='hd'/>
|
|
<smbios mode='sysinfo'/>
|
|
</os>
|
|
""", # noqa: E501
|
|
etree.tostring(tree.find('./os'), encoding='unicode'))
|
|
|
|
return orig_create(xml, host)
|
|
|
|
self.stub_out('nova.virt.libvirt.guest.Guest.create', fake_create)
|
|
|
|
compute = self.start_compute(libvirt_version=8006000)
|
|
|
|
# ensure we are reporting the correct trait
|
|
traits = self._get_provider_traits(self.compute_rp_uuids[compute])
|
|
self.assertIn('COMPUTE_SECURITY_UEFI_SECURE_BOOT', traits)
|
|
self.assertIn('COMPUTE_SECURITY_STATELESS_FIRMWARE', traits)
|
|
|
|
# create a server with UEFI and secure boot
|
|
timestamp = datetime.datetime(
|
|
2021, 1, 2, 3, 4, 5, tzinfo=datetime.timezone.utc
|
|
)
|
|
sb_image = {
|
|
'id': uuids.sb_image,
|
|
'name': 'sb_image',
|
|
'created_at': timestamp,
|
|
'updated_at': timestamp,
|
|
'deleted_at': None,
|
|
'deleted': False,
|
|
'status': 'active',
|
|
'is_public': False,
|
|
'container_format': 'ova',
|
|
'disk_format': 'vhd',
|
|
'size': 74185822,
|
|
'min_ram': 0,
|
|
'min_disk': 0,
|
|
'protected': False,
|
|
'visibility': 'public',
|
|
'tags': [],
|
|
'properties': {
|
|
'hw_machine_type': 'q35',
|
|
'hw_firmware_type': 'uefi',
|
|
'os_secure_boot': 'required',
|
|
'hw_firmware_stateless': True,
|
|
}
|
|
}
|
|
self.glance.create(None, sb_image)
|
|
|
|
server = self._create_server(image_uuid=uuids.sb_image)
|
|
|
|
# ensure our instance's system_metadata field is correct
|
|
self.assertInstanceHasUEFI(server, secure_boot=True, stateless=True)
|