2020-01-20 10:38:52 +01:00
|
|
|
# -*- encoding: utf-8 -*-
|
2017-02-24 00:14:13 +01:00
|
|
|
#
|
|
|
|
# The Qubes OS Project, http://www.qubes-os.org
|
|
|
|
#
|
|
|
|
# Copyright (C) 2017 Marek Marczykowski-Górecki
|
|
|
|
# <marmarek@invisiblethingslab.com>
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
# the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU Lesser General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License along
|
|
|
|
# with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-02-25 20:56:31 +01:00
|
|
|
Main Qubes() class and related classes.
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2020-01-15 18:53:43 +01:00
|
|
|
import grp
|
2017-05-24 04:24:22 +02:00
|
|
|
import os
|
2017-04-15 20:11:04 +02:00
|
|
|
import shlex
|
2017-02-25 20:56:31 +01:00
|
|
|
import socket
|
2020-01-20 10:38:52 +01:00
|
|
|
import shutil
|
2017-02-24 00:14:13 +01:00
|
|
|
import subprocess
|
2017-11-21 05:32:32 +01:00
|
|
|
import sys
|
2017-02-24 00:14:13 +01:00
|
|
|
|
2017-04-15 20:10:04 +02:00
|
|
|
import logging
|
|
|
|
|
2017-05-11 23:21:04 +02:00
|
|
|
import qubesadmin.base
|
|
|
|
import qubesadmin.exc
|
|
|
|
import qubesadmin.label
|
|
|
|
import qubesadmin.storage
|
|
|
|
import qubesadmin.utils
|
|
|
|
import qubesadmin.vm
|
|
|
|
import qubesadmin.config
|
2020-03-24 21:12:53 +01:00
|
|
|
import qubesadmin.devices
|
2017-02-24 00:14:13 +01:00
|
|
|
|
2019-08-10 19:03:17 +02:00
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
class VMCollection(object):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Collection of VMs objects"""
|
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
def __init__(self, app):
|
|
|
|
self.app = app
|
|
|
|
self._vm_list = None
|
2017-02-28 01:34:09 +01:00
|
|
|
self._vm_objects = {}
|
2017-02-24 00:14:13 +01:00
|
|
|
|
2017-02-24 01:38:47 +01:00
|
|
|
def clear_cache(self):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Clear cached list of VMs"""
|
2017-02-24 01:38:47 +01:00
|
|
|
self._vm_list = None
|
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
def refresh_cache(self, force=False):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Refresh cached list of VMs"""
|
2017-02-24 00:14:13 +01:00
|
|
|
if not force and self._vm_list is not None:
|
|
|
|
return
|
2017-02-24 00:40:07 +01:00
|
|
|
vm_list_data = self.app.qubesd_call(
|
2017-02-24 00:14:13 +01:00
|
|
|
'dom0',
|
2017-05-12 19:36:03 +02:00
|
|
|
'admin.vm.List'
|
2017-02-24 00:14:13 +01:00
|
|
|
)
|
|
|
|
new_vm_list = {}
|
|
|
|
# FIXME: this will probably change
|
|
|
|
for vm_data in vm_list_data.splitlines():
|
2017-02-24 01:00:06 +01:00
|
|
|
vm_name, props = vm_data.decode('ascii').split(' ', 1)
|
2017-03-13 04:28:13 +01:00
|
|
|
vm_name = str(vm_name)
|
2017-02-24 01:00:06 +01:00
|
|
|
props = props.split(' ')
|
2017-02-24 00:14:13 +01:00
|
|
|
new_vm_list[vm_name] = dict(
|
2017-02-24 01:00:06 +01:00
|
|
|
[vm_prop.split('=', 1) for vm_prop in props])
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
self._vm_list = new_vm_list
|
2017-03-01 15:24:36 +01:00
|
|
|
for name, vm in list(self._vm_objects.items()):
|
2017-02-28 01:34:09 +01:00
|
|
|
if vm.name not in self._vm_list:
|
|
|
|
# VM no longer exists
|
|
|
|
del self._vm_objects[name]
|
|
|
|
elif vm.__class__.__name__ != self._vm_list[vm.name]['class']:
|
|
|
|
# VM class have changed
|
|
|
|
del self._vm_objects[name]
|
|
|
|
# TODO: some generation ID, to detect VM re-creation
|
|
|
|
elif name != vm.name:
|
|
|
|
# renamed
|
|
|
|
self._vm_objects[vm.name] = vm
|
|
|
|
del self._vm_objects[name]
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
def __getitem__(self, item):
|
2019-06-25 06:28:00 +02:00
|
|
|
if isinstance(item, qubesadmin.vm.QubesVM):
|
|
|
|
item = item.name
|
2017-09-20 19:12:24 +02:00
|
|
|
if not self.app.blind_mode and item not in self:
|
2017-02-24 00:14:13 +01:00
|
|
|
raise KeyError(item)
|
2018-06-27 01:23:56 +02:00
|
|
|
return self.get_blind(item)
|
|
|
|
|
|
|
|
def get_blind(self, item):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2018-06-27 01:23:56 +02:00
|
|
|
Get a vm without downloading the list
|
|
|
|
and checking if exists
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-02-28 01:34:09 +01:00
|
|
|
if item not in self._vm_objects:
|
2017-10-02 20:43:01 +02:00
|
|
|
cls = qubesadmin.vm.QubesVM
|
|
|
|
# provide class name to constructor, if already cached (which can be
|
|
|
|
# done by 'item not in self' check above, unless blind_mode is
|
|
|
|
# enabled
|
|
|
|
klass = None
|
|
|
|
if self._vm_list and item in self._vm_list:
|
|
|
|
klass = self._vm_list[item]['class']
|
|
|
|
self._vm_objects[item] = cls(self.app, item, klass=klass)
|
2017-02-28 01:34:09 +01:00
|
|
|
return self._vm_objects[item]
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
def __contains__(self, item):
|
2019-06-25 06:28:00 +02:00
|
|
|
if isinstance(item, qubesadmin.vm.QubesVM):
|
|
|
|
item = item.name
|
2017-02-24 00:14:13 +01:00
|
|
|
self.refresh_cache()
|
|
|
|
return item in self._vm_list
|
|
|
|
|
2017-04-21 04:01:37 +02:00
|
|
|
def __delitem__(self, key):
|
2017-05-12 19:36:03 +02:00
|
|
|
self.app.qubesd_call(key, 'admin.vm.Remove')
|
2017-04-21 04:01:37 +02:00
|
|
|
self.clear_cache()
|
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
def __iter__(self):
|
|
|
|
self.refresh_cache()
|
2017-05-25 16:10:39 +02:00
|
|
|
for vm in sorted(self._vm_list):
|
2017-02-24 00:14:13 +01:00
|
|
|
yield self[vm]
|
|
|
|
|
|
|
|
def keys(self):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Get list of VM names."""
|
2017-02-24 00:14:13 +01:00
|
|
|
self.refresh_cache()
|
|
|
|
return self._vm_list.keys()
|
|
|
|
|
2017-08-08 22:11:48 +02:00
|
|
|
def values(self):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Get list of VM objects."""
|
2017-08-08 22:11:48 +02:00
|
|
|
self.refresh_cache()
|
|
|
|
return [self[name] for name in self._vm_list]
|
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
|
2017-05-11 23:21:04 +02:00
|
|
|
class QubesBase(qubesadmin.base.PropertyHolder):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Main Qubes application.
|
2018-12-03 23:09:23 +01:00
|
|
|
|
|
|
|
This is a base abstract class, don't use it directly. Use specialized
|
|
|
|
class in py:class:`qubesadmin.Qubes` instead, which points at
|
|
|
|
:py:class:`QubesLocal` or :py:class:`QubesRemote`.
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
#: domains (VMs) collection
|
|
|
|
domains = None
|
2017-03-12 00:40:14 +01:00
|
|
|
#: labels collection
|
|
|
|
labels = None
|
2017-03-12 21:21:16 +01:00
|
|
|
#: storage pools
|
|
|
|
pools = None
|
2017-04-14 13:23:02 +02:00
|
|
|
#: type of qubesd connection: either 'socket' or 'qrexec'
|
|
|
|
qubesd_connection_type = None
|
2017-04-15 20:10:04 +02:00
|
|
|
#: logger
|
|
|
|
log = None
|
2017-09-20 19:12:24 +02:00
|
|
|
#: do not check for object (VM, label etc) existence before really needed
|
|
|
|
blind_mode = False
|
2019-12-03 02:59:09 +01:00
|
|
|
#: cache retrieved properties values
|
|
|
|
cache_enabled = False
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
def __init__(self):
|
2017-05-12 19:36:03 +02:00
|
|
|
super(QubesBase, self).__init__(self, 'admin.property.', 'dom0')
|
2017-02-24 00:14:13 +01:00
|
|
|
self.domains = VMCollection(self)
|
2017-05-11 23:21:04 +02:00
|
|
|
self.labels = qubesadmin.base.WrapperObjectsCollection(
|
2017-05-12 19:36:03 +02:00
|
|
|
self, 'admin.label.List', qubesadmin.label.Label)
|
2017-05-11 23:21:04 +02:00
|
|
|
self.pools = qubesadmin.base.WrapperObjectsCollection(
|
2017-05-12 19:36:03 +02:00
|
|
|
self, 'admin.pool.List', qubesadmin.storage.Pool)
|
2017-03-12 21:21:16 +01:00
|
|
|
#: cache for available storage pool drivers and options to create them
|
|
|
|
self._pool_drivers = None
|
2017-04-15 20:10:04 +02:00
|
|
|
self.log = logging.getLogger('app')
|
2019-10-20 21:12:31 +02:00
|
|
|
self._local_name = None
|
2017-03-12 21:21:16 +01:00
|
|
|
|
2019-08-10 22:08:28 +02:00
|
|
|
def list_vmclass(self):
|
|
|
|
"""Call Qubesd in order to obtain the vm classes list"""
|
2019-10-20 13:24:56 +02:00
|
|
|
vmclass = self.qubesd_call('dom0', 'admin.vmclass.List') \
|
2019-08-10 22:08:28 +02:00
|
|
|
.decode().splitlines()
|
|
|
|
return sorted(vmclass)
|
|
|
|
|
|
|
|
def list_deviceclass(self):
|
|
|
|
"""Call Qubesd in order to obtain the device classes list"""
|
2019-10-20 13:24:56 +02:00
|
|
|
deviceclasses = self.qubesd_call('dom0', 'admin.deviceclass.List') \
|
2019-08-10 22:08:28 +02:00
|
|
|
.decode().splitlines()
|
|
|
|
return sorted(deviceclasses)
|
|
|
|
|
2017-03-12 21:21:16 +01:00
|
|
|
def _refresh_pool_drivers(self):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-03-12 21:21:16 +01:00
|
|
|
Refresh cached storage pool drivers and their parameters.
|
|
|
|
|
|
|
|
:return: None
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-03-12 21:21:16 +01:00
|
|
|
if self._pool_drivers is None:
|
|
|
|
pool_drivers_data = self.qubesd_call(
|
2017-05-12 19:36:03 +02:00
|
|
|
'dom0', 'admin.pool.ListDrivers', None, None)
|
2017-03-12 21:21:16 +01:00
|
|
|
assert pool_drivers_data.endswith(b'\n')
|
|
|
|
pool_drivers = {}
|
|
|
|
for driver_line in pool_drivers_data.decode('ascii').splitlines():
|
|
|
|
if not driver_line:
|
|
|
|
continue
|
|
|
|
driver_name, driver_options = driver_line.split(' ', 1)
|
|
|
|
pool_drivers[driver_name] = driver_options.split(' ')
|
|
|
|
self._pool_drivers = pool_drivers
|
|
|
|
|
|
|
|
@property
|
|
|
|
def pool_drivers(self):
|
2019-08-10 19:03:17 +02:00
|
|
|
""" Available storage pool drivers """
|
2017-03-12 21:21:16 +01:00
|
|
|
self._refresh_pool_drivers()
|
|
|
|
return self._pool_drivers.keys()
|
|
|
|
|
|
|
|
def pool_driver_parameters(self, driver):
|
2019-08-10 19:03:17 +02:00
|
|
|
""" Parameters to initialize storage pool using given driver """
|
2017-03-12 21:21:16 +01:00
|
|
|
self._refresh_pool_drivers()
|
|
|
|
return self._pool_drivers[driver]
|
|
|
|
|
|
|
|
def add_pool(self, name, driver, **kwargs):
|
2019-08-10 19:03:17 +02:00
|
|
|
""" Add a storage pool to config
|
2017-03-12 21:21:16 +01:00
|
|
|
|
|
|
|
:param name: name of storage pool to create
|
|
|
|
:param driver: driver to use, see :py:meth:`pool_drivers` for
|
2018-12-08 23:53:55 +01:00
|
|
|
available drivers
|
2017-03-12 21:21:16 +01:00
|
|
|
:param kwargs: configuration parameters for storage pool,
|
2018-12-08 23:53:55 +01:00
|
|
|
see :py:meth:`pool_driver_parameters` for a list
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-03-12 21:21:16 +01:00
|
|
|
# sort parameters only to ease testing, not required by API
|
|
|
|
payload = 'name={}\n'.format(name) + \
|
|
|
|
''.join('{}={}\n'.format(key, value)
|
2019-08-10 19:03:17 +02:00
|
|
|
for key, value in sorted(kwargs.items()))
|
2017-05-12 19:36:03 +02:00
|
|
|
self.qubesd_call('dom0', 'admin.pool.Add', driver,
|
2019-08-10 19:03:17 +02:00
|
|
|
payload.encode('utf-8'))
|
2017-03-12 21:21:16 +01:00
|
|
|
|
|
|
|
def remove_pool(self, name):
|
2019-08-10 19:03:17 +02:00
|
|
|
""" Remove a storage pool """
|
2017-05-12 19:36:03 +02:00
|
|
|
self.qubesd_call('dom0', 'admin.pool.Remove', name, None)
|
2017-02-24 00:14:13 +01:00
|
|
|
|
2019-10-20 21:12:31 +02:00
|
|
|
@property
|
|
|
|
def local_name(self):
|
2019-10-20 17:41:41 +02:00
|
|
|
""" Get localhost name """
|
2019-10-20 21:12:31 +02:00
|
|
|
if not self._local_name:
|
|
|
|
self._local_name = os.uname()[1]
|
2019-10-20 19:20:40 +02:00
|
|
|
|
2019-10-20 21:12:31 +02:00
|
|
|
return self._local_name
|
2019-10-20 13:31:57 +02:00
|
|
|
|
2017-04-28 02:09:16 +02:00
|
|
|
def get_label(self, label):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Get label as identified by index or name
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
:throws KeyError: when label is not found
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
# first search for name, verbatim
|
|
|
|
try:
|
|
|
|
return self.labels[label]
|
|
|
|
except KeyError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
# then search for index
|
2018-12-08 12:00:15 +01:00
|
|
|
if isinstance(label, int) or label.isdigit():
|
2018-12-04 09:40:54 +01:00
|
|
|
for i in self.labels.values():
|
2017-04-28 02:09:16 +02:00
|
|
|
if i.index == int(label):
|
|
|
|
return i
|
|
|
|
raise KeyError(label)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def get_vm_class(clsname):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Find the class for a domain.
|
2017-04-28 02:09:16 +02:00
|
|
|
|
2017-10-02 21:09:43 +02:00
|
|
|
Compatibility function, client tools use str to identify domain classes.
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
:param str clsname: name of the class
|
2017-10-02 21:09:43 +02:00
|
|
|
:return str: class
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-28 02:09:16 +02:00
|
|
|
|
2017-10-02 21:09:43 +02:00
|
|
|
return clsname
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
def add_new_vm(self, cls, name, label, template=None, pool=None,
|
2019-08-10 19:03:17 +02:00
|
|
|
pools=None):
|
|
|
|
"""Create new Virtual Machine
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
Example usage with custom storage pools:
|
|
|
|
|
2017-05-11 23:21:04 +02:00
|
|
|
>>> app = qubesadmin.Qubes()
|
2017-04-28 02:09:16 +02:00
|
|
|
>>> pools = {'private': 'external'}
|
|
|
|
>>> vm = app.add_new_vm('AppVM', 'my-new-vm', 'red',
|
|
|
|
>>> 'my-template', pools=pools)
|
|
|
|
>>> vm.netvm = app.domains['sys-whonix']
|
|
|
|
|
|
|
|
:param str cls: name of VM class (`AppVM`, `TemplateVM` etc)
|
|
|
|
:param str name: name of VM
|
|
|
|
:param str label: label color for new VM
|
|
|
|
:param str template: template to use (if apply for given VM class),
|
2018-12-08 23:53:55 +01:00
|
|
|
can be also VM object; use None for default value
|
2017-04-28 02:09:16 +02:00
|
|
|
:param str pool: storage pool to use instead of default one
|
|
|
|
:param dict pools: storage pool for specific volumes
|
2018-12-08 23:53:55 +01:00
|
|
|
|
2017-04-28 02:09:16 +02:00
|
|
|
:return new VM object
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
if not isinstance(cls, str):
|
|
|
|
cls = cls.__name__
|
|
|
|
|
2017-07-06 14:17:15 +02:00
|
|
|
if template is qubesadmin.DEFAULT:
|
|
|
|
template = None
|
|
|
|
elif template is not None:
|
2017-04-28 02:09:16 +02:00
|
|
|
template = str(template)
|
|
|
|
|
|
|
|
if pool and pools:
|
|
|
|
raise ValueError('only one of pool= and pools= can be used')
|
|
|
|
|
2017-05-12 19:36:03 +02:00
|
|
|
method_prefix = 'admin.vm.Create.'
|
2017-04-28 02:09:16 +02:00
|
|
|
payload = 'name={} label={}'.format(name, label)
|
|
|
|
if pool:
|
|
|
|
payload += ' pool={}'.format(str(pool))
|
2017-05-12 19:36:03 +02:00
|
|
|
method_prefix = 'admin.vm.CreateInPool.'
|
2017-04-28 02:09:16 +02:00
|
|
|
if pools:
|
|
|
|
payload += ''.join(' pool:{}={}'.format(vol, str(pool))
|
2019-08-10 19:03:17 +02:00
|
|
|
for vol, pool in sorted(pools.items()))
|
2017-05-12 19:36:03 +02:00
|
|
|
method_prefix = 'admin.vm.CreateInPool.'
|
2017-04-28 02:09:16 +02:00
|
|
|
|
|
|
|
self.qubesd_call('dom0', method_prefix + cls, template,
|
2019-08-10 19:03:17 +02:00
|
|
|
payload.encode('utf-8'))
|
2017-04-28 02:09:16 +02:00
|
|
|
|
2017-05-25 12:33:24 +02:00
|
|
|
self.domains.clear_cache()
|
2017-04-28 02:09:16 +02:00
|
|
|
return self.domains[name]
|
|
|
|
|
2019-08-10 19:03:17 +02:00
|
|
|
def clone_vm(self, src_vm, new_name, new_cls=None, pool=None, pools=None,
|
2020-03-24 21:12:53 +01:00
|
|
|
ignore_errors=False, ignore_volumes=None,
|
|
|
|
ignore_devices=False):
|
|
|
|
# pylint: disable=too-many-statements
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Clone Virtual Machine
|
2017-04-28 23:23:53 +02:00
|
|
|
|
|
|
|
Example usage with custom storage pools:
|
|
|
|
|
2017-05-11 23:21:04 +02:00
|
|
|
>>> app = qubesadmin.Qubes()
|
2017-04-28 23:23:53 +02:00
|
|
|
>>> pools = {'private': 'external'}
|
|
|
|
>>> src_vm = app.domains['personal']
|
|
|
|
>>> vm = app.clone_vm(src_vm, 'my-new-vm', pools=pools)
|
|
|
|
>>> vm.label = app.labels['green']
|
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
:param QubesVM or str src_vm: source VM
|
|
|
|
:param str new_name: name of new VM
|
|
|
|
:param str new_cls: name of VM class (`AppVM`, `TemplateVM` etc) - use
|
2018-12-08 23:53:55 +01:00
|
|
|
None to copy it from *src_vm*
|
2017-04-28 23:23:53 +02:00
|
|
|
:param str pool: storage pool to use instead of default one
|
|
|
|
:param dict pools: storage pool for specific volumes
|
2017-06-20 00:02:20 +02:00
|
|
|
:param bool ignore_errors: should errors on meta-data setting be only
|
2018-12-08 23:53:55 +01:00
|
|
|
logged, or abort the whole operation?
|
2018-10-18 02:43:09 +02:00
|
|
|
:param list ignore_volumes: do not clone volumes on this list,
|
2018-12-08 23:53:55 +01:00
|
|
|
like 'private' or 'root'
|
2020-03-24 21:12:53 +01:00
|
|
|
:param bool ignore_devices: if True, do not copy device assignments
|
2018-12-08 23:53:55 +01:00
|
|
|
|
2017-04-28 23:23:53 +02:00
|
|
|
:return new VM object
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-28 23:23:53 +02:00
|
|
|
|
|
|
|
if pool and pools:
|
|
|
|
raise ValueError('only one of pool= and pools= can be used')
|
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
if isinstance(src_vm, str):
|
|
|
|
src_vm = self.domains[src_vm]
|
|
|
|
|
|
|
|
if new_cls is None:
|
2017-10-02 20:43:01 +02:00
|
|
|
new_cls = src_vm.klass
|
2017-04-28 23:23:53 +02:00
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
template = getattr(src_vm, 'template', None)
|
|
|
|
if template is not None:
|
|
|
|
template = str(template)
|
|
|
|
|
|
|
|
label = src_vm.label
|
|
|
|
|
2018-12-07 22:20:01 +01:00
|
|
|
if pool is None and pools is None:
|
|
|
|
# use the same pools as the source - check if non default is used
|
|
|
|
for volume in sorted(src_vm.volumes.values()):
|
|
|
|
if not volume.save_on_stop:
|
|
|
|
# clone only persistent volumes
|
|
|
|
continue
|
|
|
|
if ignore_volumes and volume.name in ignore_volumes:
|
|
|
|
continue
|
|
|
|
default_pool = getattr(self.app, 'default_pool_' + volume.name,
|
2019-08-10 19:03:17 +02:00
|
|
|
volume.pool)
|
2018-12-07 22:20:01 +01:00
|
|
|
if default_pool != volume.pool:
|
|
|
|
if pools is None:
|
|
|
|
pools = {}
|
|
|
|
pools[volume.name] = volume.pool
|
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
method_prefix = 'admin.vm.Create.'
|
|
|
|
payload = 'name={} label={}'.format(new_name, label)
|
2017-04-28 23:23:53 +02:00
|
|
|
if pool:
|
|
|
|
payload += ' pool={}'.format(str(pool))
|
2017-06-20 00:02:20 +02:00
|
|
|
method_prefix = 'admin.vm.CreateInPool.'
|
2017-04-28 23:23:53 +02:00
|
|
|
if pools:
|
|
|
|
payload += ''.join(' pool:{}={}'.format(vol, str(pool))
|
2019-08-10 19:03:17 +02:00
|
|
|
for vol, pool in sorted(pools.items()))
|
2017-06-20 00:02:20 +02:00
|
|
|
method_prefix = 'admin.vm.CreateInPool.'
|
|
|
|
|
|
|
|
self.qubesd_call('dom0', method_prefix + new_cls, template,
|
2019-08-10 19:03:17 +02:00
|
|
|
payload.encode('utf-8'))
|
2017-06-20 00:02:20 +02:00
|
|
|
|
|
|
|
self.domains.clear_cache()
|
|
|
|
dst_vm = self.domains[new_name]
|
|
|
|
try:
|
|
|
|
assert isinstance(dst_vm, qubesadmin.vm.QubesVM)
|
|
|
|
for prop in src_vm.property_list():
|
|
|
|
# handled by admin.vm.Create call
|
2018-10-22 00:37:44 +02:00
|
|
|
if prop in ('name', 'qid', 'template', 'label', 'uuid',
|
2019-08-10 19:03:17 +02:00
|
|
|
'installed_by_rpm'):
|
2017-06-20 00:02:20 +02:00
|
|
|
continue
|
|
|
|
if src_vm.property_is_default(prop):
|
|
|
|
continue
|
|
|
|
try:
|
|
|
|
setattr(dst_vm, prop, getattr(src_vm, prop))
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
|
|
|
except qubesadmin.exc.QubesException as e:
|
|
|
|
dst_vm.log.error(
|
|
|
|
'Failed to set {!s} property: {!s}'.format(prop, e))
|
|
|
|
if not ignore_errors:
|
|
|
|
raise
|
|
|
|
|
|
|
|
for tag in src_vm.tags:
|
2017-07-14 04:14:46 +02:00
|
|
|
if tag.startswith('created-by-'):
|
|
|
|
continue
|
2017-06-20 00:02:20 +02:00
|
|
|
try:
|
|
|
|
dst_vm.tags.add(tag)
|
|
|
|
except qubesadmin.exc.QubesException as e:
|
|
|
|
dst_vm.log.error(
|
|
|
|
'Failed to add {!s} tag: {!s}'.format(tag, e))
|
|
|
|
if not ignore_errors:
|
|
|
|
raise
|
|
|
|
|
|
|
|
for feature, value in src_vm.features.items():
|
|
|
|
try:
|
|
|
|
dst_vm.features[feature] = value
|
|
|
|
except qubesadmin.exc.QubesException as e:
|
|
|
|
dst_vm.log.error(
|
|
|
|
'Failed to set {!s} feature: {!s}'.format(feature, e))
|
|
|
|
if not ignore_errors:
|
|
|
|
raise
|
|
|
|
|
|
|
|
try:
|
|
|
|
dst_vm.firewall.save_rules(src_vm.firewall.rules)
|
|
|
|
except qubesadmin.exc.QubesException as e:
|
|
|
|
self.log.error('Failed to set firewall: %s', e)
|
|
|
|
if not ignore_errors:
|
|
|
|
raise
|
|
|
|
|
2018-10-22 00:33:37 +02:00
|
|
|
try:
|
|
|
|
# FIXME: convert to qrexec calls to dom0/GUI VM
|
|
|
|
appmenus_cmd = \
|
|
|
|
['qvm-appmenus', '--init', '--update',
|
2019-08-10 19:03:17 +02:00
|
|
|
'--source', src_vm.name, dst_vm.name]
|
2018-10-22 00:33:37 +02:00
|
|
|
subprocess.check_output(appmenus_cmd, stderr=subprocess.STDOUT)
|
|
|
|
except OSError:
|
|
|
|
# this file needs to be python 2.7 compatible,
|
|
|
|
# so no FileNotFoundError
|
|
|
|
self.log.error('Failed to clone appmenus, qvm-appmenus missing')
|
|
|
|
if not ignore_errors:
|
|
|
|
raise qubesadmin.exc.QubesException(
|
|
|
|
'Failed to clone appmenus')
|
|
|
|
except subprocess.CalledProcessError as e:
|
|
|
|
self.log.error('Failed to clone appmenus: %s',
|
2019-08-10 19:03:17 +02:00
|
|
|
e.output.decode())
|
2018-10-22 00:33:37 +02:00
|
|
|
if not ignore_errors:
|
|
|
|
raise qubesadmin.exc.QubesException(
|
|
|
|
'Failed to clone appmenus')
|
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
except qubesadmin.exc.QubesException:
|
|
|
|
if not ignore_errors:
|
|
|
|
del self.domains[dst_vm.name]
|
|
|
|
raise
|
|
|
|
|
|
|
|
try:
|
|
|
|
for dst_volume in sorted(dst_vm.volumes.values()):
|
|
|
|
if not dst_volume.save_on_stop:
|
|
|
|
# clone only persistent volumes
|
|
|
|
continue
|
2018-10-18 02:43:09 +02:00
|
|
|
if ignore_volumes and dst_volume.name in ignore_volumes:
|
|
|
|
continue
|
2017-06-20 00:02:20 +02:00
|
|
|
src_volume = src_vm.volumes[dst_volume.name]
|
|
|
|
dst_vm.log.info('Cloning {} volume'.format(dst_volume.name))
|
|
|
|
dst_volume.clone(src_volume)
|
2017-04-28 23:23:53 +02:00
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
except qubesadmin.exc.QubesException:
|
|
|
|
del self.domains[dst_vm.name]
|
|
|
|
raise
|
2017-04-28 23:23:53 +02:00
|
|
|
|
2020-03-24 21:12:53 +01:00
|
|
|
if not ignore_devices:
|
|
|
|
try:
|
|
|
|
for devclass in src_vm.devices:
|
|
|
|
for assignment in src_vm.devices[devclass].assignments(
|
|
|
|
persistent=True):
|
|
|
|
new_assignment = qubesadmin.devices.DeviceAssignment(
|
|
|
|
backend_domain=assignment.backend_domain,
|
|
|
|
ident=assignment.ident,
|
|
|
|
options=assignment.options,
|
|
|
|
persistent=assignment.persistent)
|
|
|
|
dst_vm.devices[devclass].attach(new_assignment)
|
|
|
|
except qubesadmin.exc.QubesException:
|
|
|
|
if not ignore_errors:
|
|
|
|
del self.domains[dst_vm.name]
|
|
|
|
raise
|
|
|
|
|
2017-06-20 00:02:20 +02:00
|
|
|
return dst_vm
|
2017-04-28 23:23:53 +02:00
|
|
|
|
2018-12-03 23:09:23 +01:00
|
|
|
def qubesd_call(self, dest, method, arg=None, payload=None,
|
2019-08-10 19:03:17 +02:00
|
|
|
payload_stream=None):
|
|
|
|
"""
|
2018-12-03 23:09:23 +01:00
|
|
|
Execute Admin API method.
|
|
|
|
|
2020-01-20 10:38:52 +01:00
|
|
|
If `payload` and `payload_stream` are both specified, they will be sent
|
|
|
|
in that order.
|
2018-12-03 23:09:23 +01:00
|
|
|
|
|
|
|
:param dest: Destination VM name
|
|
|
|
:param method: Full API method name ('admin...')
|
|
|
|
:param arg: Method argument (if any)
|
|
|
|
:param payload: Payload send to the method
|
|
|
|
:param payload_stream: file-like object to read payload from
|
|
|
|
:return: Data returned by qubesd (string)
|
|
|
|
|
|
|
|
.. warning:: *payload_stream* will get closed by this function
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2018-12-03 23:09:23 +01:00
|
|
|
raise NotImplementedError(
|
|
|
|
'qubesd_call not implemented in QubesBase class; use specialized '
|
|
|
|
'class: qubesadmin.Qubes()')
|
|
|
|
|
2017-04-15 20:11:04 +02:00
|
|
|
def run_service(self, dest, service, filter_esc=False, user=None,
|
2019-09-21 03:57:35 +02:00
|
|
|
localcmd=None, wait=True, autostart=True, **kwargs):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Run qrexec service in a given destination
|
2017-04-15 20:11:04 +02:00
|
|
|
|
|
|
|
*kwargs* are passed verbatim to :py:meth:`subprocess.Popen`.
|
|
|
|
|
|
|
|
:param str dest: Destination - may be a VM name or empty
|
2018-12-08 23:53:55 +01:00
|
|
|
string for default (for a given service)
|
2017-04-15 20:11:04 +02:00
|
|
|
:param str service: service name
|
|
|
|
:param bool filter_esc: filter escape sequences to protect terminal \
|
|
|
|
emulator
|
|
|
|
:param str user: username to run service as
|
|
|
|
:param str localcmd: Command to connect stdin/stdout to
|
2019-08-10 19:03:17 +02:00
|
|
|
:param bool wait: Wait service run
|
2019-09-21 03:57:35 +02:00
|
|
|
:param bool autostart: Automatically start the target VM
|
2017-04-15 20:11:04 +02:00
|
|
|
:rtype: subprocess.Popen
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2018-12-03 23:09:23 +01:00
|
|
|
raise NotImplementedError(
|
|
|
|
'run_service not implemented in QubesBase class; use specialized '
|
|
|
|
'class: qubesadmin.Qubes()')
|
2017-04-15 20:11:04 +02:00
|
|
|
|
2020-01-20 10:38:52 +01:00
|
|
|
@staticmethod
|
|
|
|
def _call_with_stream(command, payload, payload_stream):
|
|
|
|
"""Helper method to pass data to qubesd. Calls a command with
|
|
|
|
payload and payload_stream as input.
|
|
|
|
|
|
|
|
:param command: command to run
|
|
|
|
:param payload: Initial payload, or None
|
|
|
|
:param payload_stream: File-like object with the rest of data
|
|
|
|
:return: (process, stdout, stderr)
|
|
|
|
"""
|
|
|
|
|
|
|
|
if payload:
|
|
|
|
# It's not strictly correct to write data to stdin in this way,
|
|
|
|
# because the process can get blocked on stdout or stderr pipe.
|
|
|
|
# However, in practice the output should be always smaller than 4K.
|
|
|
|
proc = subprocess.Popen(
|
|
|
|
command,
|
|
|
|
stdin=subprocess.PIPE,
|
|
|
|
stdout=subprocess.PIPE,
|
|
|
|
stderr=subprocess.PIPE)
|
|
|
|
proc.stdin.write(payload)
|
|
|
|
try:
|
|
|
|
shutil.copyfileobj(payload_stream, proc.stdin)
|
|
|
|
except BrokenPipeError:
|
|
|
|
# We might receive an error from qubesd before we sent
|
|
|
|
# everything (for instance, because we are sending too much
|
|
|
|
# data).
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
# Connect the stream directly.
|
|
|
|
proc = subprocess.Popen(
|
|
|
|
command,
|
|
|
|
stdin=payload_stream,
|
|
|
|
stdout=subprocess.PIPE,
|
|
|
|
stderr=subprocess.PIPE)
|
|
|
|
|
|
|
|
payload_stream.close()
|
|
|
|
stdout, stderr = proc.communicate()
|
|
|
|
return proc, stdout, stderr
|
|
|
|
|
2019-12-03 02:59:09 +01:00
|
|
|
def _invalidate_cache(self, subject, event, name, **kwargs):
|
|
|
|
"""Invalidate cached value of a property.
|
|
|
|
|
|
|
|
This method is designed to be hooked as an event handler for:
|
|
|
|
- property-set:*
|
|
|
|
- property-del:*
|
|
|
|
|
|
|
|
This is done in :py:class:`qubesadmin.events.EventsDispatcher` class
|
|
|
|
directly, before calling other handlers.
|
|
|
|
|
|
|
|
It handles both VM and global properties.
|
|
|
|
Note: even if the new value is given in the event arguments, it is
|
|
|
|
ignored because it comes without type information.
|
|
|
|
|
|
|
|
:param subject: either VM object or None
|
|
|
|
:param event: name of the event
|
|
|
|
:param name: name of the property
|
|
|
|
:param kwargs: other arguments
|
|
|
|
:return: none
|
|
|
|
""" # pylint: disable=unused-argument
|
|
|
|
if subject is None:
|
|
|
|
subject = self
|
|
|
|
|
|
|
|
try:
|
|
|
|
# pylint: disable=protected-access
|
|
|
|
del subject._properties_cache[name]
|
|
|
|
except KeyError:
|
|
|
|
pass
|
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
class QubesLocal(QubesBase):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Application object communicating through local socket.
|
2017-02-25 20:56:31 +01:00
|
|
|
|
|
|
|
Used when running in dom0.
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-14 13:23:02 +02:00
|
|
|
|
|
|
|
qubesd_connection_type = 'socket'
|
|
|
|
|
2017-05-24 04:24:22 +02:00
|
|
|
def qubesd_call(self, dest, method, arg=None, payload=None,
|
2019-08-10 19:03:17 +02:00
|
|
|
payload_stream=None):
|
|
|
|
"""
|
2017-05-24 04:24:22 +02:00
|
|
|
Execute Admin API method.
|
|
|
|
|
2020-01-20 10:38:52 +01:00
|
|
|
If `payload` and `payload_stream` are both specified, they will be sent
|
|
|
|
in that order.
|
2017-05-24 04:24:22 +02:00
|
|
|
|
|
|
|
:param dest: Destination VM name
|
|
|
|
:param method: Full API method name ('admin...')
|
|
|
|
:param arg: Method argument (if any)
|
|
|
|
:param payload: Payload send to the method
|
|
|
|
:param payload_stream: file-like object to read payload from
|
|
|
|
:return: Data returned by qubesd (string)
|
2017-05-26 19:09:29 +02:00
|
|
|
|
|
|
|
.. warning:: *payload_stream* will get closed by this function
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-05-24 04:24:22 +02:00
|
|
|
if payload_stream:
|
|
|
|
# payload_stream can be used for large amount of data,
|
|
|
|
# so optimize for throughput, not latency: spawn actual qrexec
|
|
|
|
# service implementation, which may use some optimization there (
|
|
|
|
# see admin.vm.volume.Import - actual data handling is done with dd)
|
|
|
|
method_path = os.path.join(
|
|
|
|
qubesadmin.config.QREXEC_SERVICES_DIR, method)
|
|
|
|
if not os.path.exists(method_path):
|
|
|
|
raise qubesadmin.exc.QubesDaemonCommunicationError(
|
|
|
|
'{} not found'.format(method_path))
|
2017-07-17 16:15:39 +02:00
|
|
|
command = ['env', 'QREXEC_REMOTE_DOMAIN=dom0',
|
2019-08-10 19:03:17 +02:00
|
|
|
'QREXEC_REQUESTED_TARGET=' + dest, method_path, arg]
|
2017-07-17 16:15:39 +02:00
|
|
|
if os.getuid() != 0:
|
|
|
|
command.insert(0, 'sudo')
|
2020-01-20 10:38:52 +01:00
|
|
|
(_, stdout, _) = self._call_with_stream(
|
|
|
|
command, payload, payload_stream)
|
|
|
|
return self._parse_qubesd_response(stdout)
|
2017-05-24 04:24:22 +02:00
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
try:
|
|
|
|
client_socket = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
|
2017-05-11 23:21:04 +02:00
|
|
|
client_socket.connect(qubesadmin.config.QUBESD_SOCKET)
|
2018-07-14 01:49:14 +02:00
|
|
|
except (IOError, OSError) as e:
|
|
|
|
raise qubesadmin.exc.QubesDaemonCommunicationError(
|
|
|
|
'Failed to connect to qubesd service: %s', str(e))
|
2017-02-24 00:14:13 +01:00
|
|
|
|
2020-04-20 00:45:50 +02:00
|
|
|
call_header = '{}+{} dom0 name {}\0'.format(method, arg or '', dest)
|
|
|
|
client_socket.sendall(call_header.encode('ascii'))
|
2017-02-24 00:14:13 +01:00
|
|
|
if payload is not None:
|
|
|
|
client_socket.sendall(payload)
|
|
|
|
|
2017-02-27 20:15:24 +01:00
|
|
|
client_socket.shutdown(socket.SHUT_WR)
|
|
|
|
|
2017-03-11 01:16:10 +01:00
|
|
|
return_data = client_socket.makefile('rb').read()
|
2017-04-28 23:21:07 +02:00
|
|
|
client_socket.close()
|
2017-02-24 00:14:13 +01:00
|
|
|
return self._parse_qubesd_response(return_data)
|
|
|
|
|
2017-04-15 20:11:04 +02:00
|
|
|
def run_service(self, dest, service, filter_esc=False, user=None,
|
2019-09-21 03:57:35 +02:00
|
|
|
localcmd=None, wait=True, autostart=True, **kwargs):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Run qrexec service in a given destination
|
2017-04-15 20:11:04 +02:00
|
|
|
|
|
|
|
:param str dest: Destination - may be a VM name or empty
|
2018-12-08 23:53:55 +01:00
|
|
|
string for default (for a given service)
|
2017-04-15 20:11:04 +02:00
|
|
|
:param str service: service name
|
|
|
|
:param bool filter_esc: filter escape sequences to protect terminal \
|
|
|
|
emulator
|
|
|
|
:param str user: username to run service as
|
|
|
|
:param str localcmd: Command to connect stdin/stdout to
|
2017-05-19 17:30:46 +02:00
|
|
|
:param bool wait: wait for remote process to finish
|
2017-04-15 20:11:04 +02:00
|
|
|
:rtype: subprocess.Popen
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-15 20:11:04 +02:00
|
|
|
|
|
|
|
if not dest:
|
|
|
|
raise ValueError('Empty destination name allowed only from a VM')
|
2017-05-19 17:30:46 +02:00
|
|
|
if not wait and localcmd:
|
|
|
|
raise ValueError('wait=False incompatible with localcmd')
|
2019-09-21 03:57:35 +02:00
|
|
|
if autostart:
|
|
|
|
try:
|
|
|
|
self.qubesd_call(dest, 'admin.vm.Start')
|
|
|
|
except qubesadmin.exc.QubesVMNotHaltedError:
|
|
|
|
pass
|
|
|
|
elif not self.domains.get_blind(dest).is_running():
|
|
|
|
raise qubesadmin.exc.QubesVMNotRunningError(
|
|
|
|
'%s is not running', dest)
|
2020-01-15 18:53:43 +01:00
|
|
|
if dest == 'dom0':
|
|
|
|
# can't make real dom0->dom0 call
|
|
|
|
if filter_esc:
|
|
|
|
raise NotImplementedError(
|
|
|
|
'filter_esc=True not implemented in dom0->dom0 calls')
|
|
|
|
if localcmd:
|
|
|
|
raise NotImplementedError(
|
|
|
|
'localcmd not implemented in dom0->dom0 calls')
|
|
|
|
if not wait:
|
|
|
|
raise NotImplementedError(
|
|
|
|
'wait=False not implemented in dom0->dom0 calls')
|
|
|
|
if user is None:
|
|
|
|
user = grp.getgrnam('qubes').gr_mem[0]
|
|
|
|
|
|
|
|
kwargs.setdefault('stdin', subprocess.PIPE)
|
|
|
|
kwargs.setdefault('stdout', subprocess.PIPE)
|
|
|
|
kwargs.setdefault('stderr', subprocess.PIPE)
|
|
|
|
# Set default locale to C in order to prevent error msg
|
|
|
|
# in subprocess call related to falling back to C locale
|
|
|
|
env = os.environ.copy()
|
|
|
|
env['LC_ALL'] = 'C'
|
|
|
|
cmd = '/etc/qubes-rpc/' + service
|
|
|
|
arg = ''
|
|
|
|
if not os.path.exists(cmd) and '+' in service:
|
|
|
|
cmd, arg = cmd.split('+', 1)
|
|
|
|
p = subprocess.Popen(
|
|
|
|
['sudo', '-u', user, cmd, arg],
|
|
|
|
**kwargs,
|
|
|
|
env=env,
|
|
|
|
)
|
|
|
|
return p
|
2017-04-15 20:11:04 +02:00
|
|
|
qrexec_opts = ['-d', dest]
|
|
|
|
if filter_esc:
|
2017-11-21 05:32:32 +01:00
|
|
|
qrexec_opts.extend(['-t'])
|
|
|
|
if filter_esc or os.isatty(sys.stderr.fileno()):
|
|
|
|
qrexec_opts.extend(['-T'])
|
2017-04-15 20:11:04 +02:00
|
|
|
if localcmd:
|
|
|
|
qrexec_opts.extend(['-l', localcmd])
|
|
|
|
if user is None:
|
|
|
|
user = 'DEFAULT'
|
2017-05-19 17:30:46 +02:00
|
|
|
if not wait:
|
|
|
|
qrexec_opts.extend(['-e'])
|
2018-01-12 19:57:45 +01:00
|
|
|
if 'connect_timeout' in kwargs:
|
|
|
|
qrexec_opts.extend(['-w', str(kwargs.pop('connect_timeout'))])
|
2017-04-15 20:11:04 +02:00
|
|
|
kwargs.setdefault('stdin', subprocess.PIPE)
|
|
|
|
kwargs.setdefault('stdout', subprocess.PIPE)
|
|
|
|
kwargs.setdefault('stderr', subprocess.PIPE)
|
2019-08-10 19:03:17 +02:00
|
|
|
proc = subprocess.Popen(
|
|
|
|
[qubesadmin.config.QREXEC_CLIENT] + qrexec_opts + [
|
|
|
|
'{}:QUBESRPC {} dom0'.format(user, service)], **kwargs)
|
2017-04-15 20:11:04 +02:00
|
|
|
return proc
|
|
|
|
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
class QubesRemote(QubesBase):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Application object communicating through qrexec services.
|
2017-02-25 20:56:31 +01:00
|
|
|
|
|
|
|
Used when running in VM.
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-04-14 13:23:02 +02:00
|
|
|
|
|
|
|
qubesd_connection_type = 'qrexec'
|
|
|
|
|
2017-05-24 04:24:22 +02:00
|
|
|
def qubesd_call(self, dest, method, arg=None, payload=None,
|
2019-08-10 19:03:17 +02:00
|
|
|
payload_stream=None):
|
|
|
|
"""
|
2017-05-24 04:24:22 +02:00
|
|
|
Execute Admin API method.
|
|
|
|
|
2020-01-20 10:38:52 +01:00
|
|
|
If `payload` and `payload_stream` are both specified, they will be sent
|
|
|
|
in that order.
|
2017-05-24 04:24:22 +02:00
|
|
|
|
|
|
|
:param dest: Destination VM name
|
|
|
|
:param method: Full API method name ('admin...')
|
|
|
|
:param arg: Method argument (if any)
|
|
|
|
:param payload: Payload send to the method
|
|
|
|
:param payload_stream: file-like object to read payload from
|
|
|
|
:return: Data returned by qubesd (string)
|
2017-05-26 19:09:29 +02:00
|
|
|
|
|
|
|
.. warning:: *payload_stream* will get closed by this function
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2017-02-24 00:14:13 +01:00
|
|
|
service_name = method
|
|
|
|
if arg is not None:
|
|
|
|
service_name += '+' + arg
|
2020-01-20 10:38:52 +01:00
|
|
|
command = [qubesadmin.config.QREXEC_CLIENT_VM,
|
|
|
|
dest, service_name]
|
|
|
|
if payload_stream:
|
|
|
|
(p, stdout, stderr) = self._call_with_stream(
|
|
|
|
command, payload, payload_stream)
|
|
|
|
else:
|
|
|
|
p = subprocess.Popen(command,
|
|
|
|
stdin=subprocess.PIPE,
|
|
|
|
stdout=subprocess.PIPE,
|
|
|
|
stderr=subprocess.PIPE)
|
|
|
|
(stdout, stderr) = p.communicate(payload)
|
2017-02-24 00:14:13 +01:00
|
|
|
if p.returncode != 0:
|
2017-07-05 14:14:11 +02:00
|
|
|
raise qubesadmin.exc.QubesDaemonNoResponseError(
|
|
|
|
'Service call error: %s', stderr.decode())
|
2017-02-24 00:14:13 +01:00
|
|
|
|
|
|
|
return self._parse_qubesd_response(stdout)
|
2017-04-15 20:11:04 +02:00
|
|
|
|
|
|
|
def run_service(self, dest, service, filter_esc=False, user=None,
|
2019-09-21 03:57:35 +02:00
|
|
|
localcmd=None, wait=True, autostart=True, **kwargs):
|
2019-08-10 19:03:17 +02:00
|
|
|
"""Run qrexec service in a given destination
|
2017-04-15 20:11:04 +02:00
|
|
|
|
|
|
|
:param str dest: Destination - may be a VM name or empty
|
2018-12-08 23:53:55 +01:00
|
|
|
string for default (for a given service)
|
2017-04-15 20:11:04 +02:00
|
|
|
:param str service: service name
|
|
|
|
:param bool filter_esc: filter escape sequences to protect terminal \
|
|
|
|
emulator
|
|
|
|
:param str user: username to run service as
|
|
|
|
:param str localcmd: Command to connect stdin/stdout to
|
2017-05-19 17:30:46 +02:00
|
|
|
:param bool wait: wait for process to finish
|
2017-04-15 20:11:04 +02:00
|
|
|
:rtype: subprocess.Popen
|
2019-08-10 19:03:17 +02:00
|
|
|
"""
|
2019-09-21 03:57:35 +02:00
|
|
|
if not autostart and not dest:
|
|
|
|
raise ValueError(
|
|
|
|
'autostart=False makes sense only with a defined target')
|
2017-04-15 20:11:04 +02:00
|
|
|
if user:
|
|
|
|
raise ValueError(
|
|
|
|
'non-default user not possible for calls from VM')
|
2017-05-19 17:30:46 +02:00
|
|
|
if not wait and localcmd:
|
|
|
|
raise ValueError('wait=False incompatible with localcmd')
|
2019-09-21 03:47:30 +02:00
|
|
|
qrexec_opts = []
|
|
|
|
if filter_esc:
|
|
|
|
qrexec_opts.extend(['-t'])
|
2019-09-21 03:57:35 +02:00
|
|
|
if filter_esc or (
|
|
|
|
os.isatty(sys.stderr.fileno()) and 'stderr' not in kwargs):
|
2019-09-21 03:47:30 +02:00
|
|
|
qrexec_opts.extend(['-T'])
|
2019-09-21 03:57:35 +02:00
|
|
|
if not autostart and not self.domains.get_blind(dest).is_running():
|
|
|
|
raise qubesadmin.exc.QubesVMNotRunningError(
|
|
|
|
'%s is not running', dest)
|
2017-05-19 17:30:46 +02:00
|
|
|
if not wait:
|
|
|
|
# qrexec-client-vm can only request service calls, which are
|
|
|
|
# started using MSG_EXEC_CMDLINE qrexec protocol message; this
|
|
|
|
# message means "start the process, pipe its stdin/out/err,
|
|
|
|
# and when it terminates, send exit code back".
|
|
|
|
# According to the protocol qrexec-client-vm needs to wait for
|
|
|
|
# MSG_DATA_EXIT_CODE, so implementing wait=False would require
|
|
|
|
# some protocol change (or protocol violation).
|
|
|
|
raise NotImplementedError(
|
|
|
|
'wait=False not implemented for calls from VM')
|
2017-04-15 20:11:04 +02:00
|
|
|
kwargs.setdefault('stdin', subprocess.PIPE)
|
|
|
|
kwargs.setdefault('stdout', subprocess.PIPE)
|
|
|
|
kwargs.setdefault('stderr', subprocess.PIPE)
|
2019-08-10 19:03:17 +02:00
|
|
|
proc = subprocess.Popen(
|
2019-09-21 03:47:30 +02:00
|
|
|
[qubesadmin.config.QREXEC_CLIENT_VM] +
|
2019-10-20 13:24:56 +02:00
|
|
|
qrexec_opts +
|
|
|
|
[dest or '', service] +
|
|
|
|
(shlex.split(localcmd) if localcmd else []),
|
2019-09-21 03:47:30 +02:00
|
|
|
**kwargs)
|
2017-04-15 20:11:04 +02:00
|
|
|
return proc
|