123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427 |
- # -*- encoding: utf8 -*-
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2017 Marek Marczykowski-Górecki
- # <marmarek@invisiblethingslab.com>
- #
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU Lesser General Public License as published by
- # the Free Software Foundation; either version 2.1 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU Lesser General Public License for more details.
- #
- # You should have received a copy of the GNU Lesser General Public License along
- # with this program; if not, see <http://www.gnu.org/licenses/>.
- ''' GUI daemon launcher tool'''
- import os
- import signal
- import subprocess
- import asyncio
- import re
- import daemon.pidfile
- import qubesadmin
- import qubesadmin.tools
- import qubesadmin.vm
- have_events = False
- try:
- # pylint: disable=wrong-import-position
- import qubesadmin.events
- have_events = True
- except ImportError:
- pass
- GUI_DAEMON_PATH = '/usr/bin/qubes-guid'
- QUBES_ICON_DIR = '/usr/share/icons/hicolor/128x128/devices'
- # "LVDS connected 1024x768+0+0 (normal left inverted right) 304mm x 228mm"
- REGEX_OUTPUT = re.compile(r'''
- (?x) # ignore whitespace
- ^ # start of string
- (?P<output>[A-Za-z0-9\-]*)[ ] # LVDS VGA etc
- (?P<connect>(dis)?connected) # dis/connected
- ([ ]
- (?P<primary>(primary)?)[ ]?
- (( # a group
- (?P<width>\d+)x # either 1024x768+0+0
- (?P<height>\d+)[+]
- (?P<x>\d+)[+]
- (?P<y>\d+)
- )|[\D]) # or not a digit
- ([ ]\(.*\))?[ ]? # ignore options
- ( # 304mm x 228mm
- (?P<width_mm>\d+)mm[ ]x[ ]
- (?P<height_mm>\d+)mm
- )?
- .* # ignore rest of line
- )? # everything after (dis)connect is optional
- ''')
- def get_monitor_layout():
- '''Get list of monitors and their size/position'''
- outputs = []
- for line in subprocess.Popen(
- ['xrandr', '-q'], stdout=subprocess.PIPE).stdout:
- line = line.decode()
- if not line.startswith("Screen") and not line.startswith(" "):
- output_params = REGEX_OUTPUT.match(line).groupdict()
- if output_params['width']:
- phys_size = ""
- if output_params['width_mm'] and int(output_params['width_mm']):
- # don't provide real values for privacy reasons - see
- # #1951 for details
- dpi = (int(output_params['width']) * 254 //
- int(output_params['width_mm']) // 10)
- if dpi > 300:
- dpi = 300
- elif dpi > 200:
- dpi = 200
- elif dpi > 150:
- dpi = 150
- else:
- # if lower, don't provide this info to the VM at all
- dpi = 0
- if dpi:
- # now calculate dimensions based on approximate DPI
- phys_size = " {} {}".format(
- int(output_params['width']) * 254 // dpi // 10,
- int(output_params['height']) * 254 // dpi // 10,
- )
- outputs.append("%s %s %s %s%s\n" % (
- output_params['width'],
- output_params['height'],
- output_params['x'],
- output_params['y'],
- phys_size,
- ))
- return outputs
- class GUILauncher(object):
- '''Launch GUI daemon for VMs'''
- def __init__(self, app: qubesadmin.app.QubesBase):
- ''' Initialize GUILauncher.
- :param app: :py:class:`qubesadmin.Qubes` instance
- '''
- self.app = app
- self.started_processes = {}
- @staticmethod
- def kde_guid_args(vm):
- '''Return KDE-specific arguments for gui-daemon, if applicable'''
- guid_cmd = []
- # Avoid using environment variables for checking the current session,
- # because this script may be called with cleared env (like with sudo).
- if subprocess.check_output(
- ['xprop', '-root', '-notype', 'KWIN_RUNNING']) == \
- b'KWIN_RUNNING = 0x1\n':
- # native decoration plugins is used, so adjust window properties
- # accordingly
- guid_cmd += ['-T'] # prefix window titles with VM name
- # get owner of X11 session
- session_owner = None
- for line in subprocess.check_output(['xhost']).splitlines():
- if line == b'SI:localuser:root':
- pass
- elif line.startswith(b'SI:localuser:'):
- session_owner = line.split(b':')[2].decode()
- if session_owner is not None:
- data_dir = os.path.expanduser(
- '~{}/.local/share'.format(session_owner))
- else:
- # fallback to current user
- data_dir = os.path.expanduser('~/.local/share')
- guid_cmd += ['-p',
- '_KDE_NET_WM_COLOR_SCHEME=s:{}'.format(
- os.path.join(data_dir,
- 'qubes-kde', vm.label.name + '.colors'))]
- return guid_cmd
- def common_guid_args(self, vm):
- '''Common qubes-guid arguments for PV(H), HVM and Stubdomain'''
- guid_cmd = [GUI_DAEMON_PATH,
- '-N', vm.name,
- '-c', vm.label.color,
- '-i', os.path.join(QUBES_ICON_DIR, vm.label.icon) + '.png',
- '-l', str(vm.label.index)]
- if vm.debug:
- guid_cmd += ['-v', '-v']
- # elif not verbose:
- else:
- guid_cmd += ['-q']
- guid_cmd += self.kde_guid_args(vm)
- return guid_cmd
- @staticmethod
- def guid_pidfile(xid):
- '''Helper function to construct a pidfile path'''
- return '/var/run/qubes/guid-running.{}'.format(xid)
- @asyncio.coroutine
- def start_gui_for_vm(self, vm, monitor_layout=None):
- '''Start GUI daemon (qubes-guid) connected directly to a VM
- This function is a coroutine.
- :param vm: VM for which start GUI daemon
- :param monitor_layout: monitor layout to send; if None, fetch it from
- local X server.
- '''
- guid_cmd = self.common_guid_args(vm)
- guid_cmd.extend(['-d', str(vm.xid)])
- if vm.virt_mode == 'hvm':
- guid_cmd.extend(['-n'])
- if vm.features.check_with_template('rpc-clipboard', False):
- guid_cmd.extend(['-Q'])
- stubdom_guid_pidfile = self.guid_pidfile(vm.stubdom_xid)
- if not vm.debug and os.path.exists(stubdom_guid_pidfile):
- # Terminate stubdom guid once "real" gui agent connects
- with open(stubdom_guid_pidfile, 'r') as pidfile:
- stubdom_guid_pid = pidfile.read().strip()
- guid_cmd += ['-K', stubdom_guid_pid]
- vm.log.info('Starting GUI')
- yield from asyncio.create_subprocess_exec(*guid_cmd)
- yield from self.send_monitor_layout(vm, layout=monitor_layout,
- startup=True)
- @asyncio.coroutine
- def start_gui_for_stubdomain(self, vm, force=False):
- '''Start GUI daemon (qubes-guid) connected to a stubdomain
- This function is a coroutine.
- '''
- want_stubdom = force
- # if no 'gui' feature set at all, assume no gui agent installed
- if not want_stubdom and \
- vm.features.check_with_template('gui', None) is None:
- want_stubdom = True
- if not want_stubdom and vm.debug:
- want_stubdom = True
- if not want_stubdom:
- return
- if os.path.exists(self.guid_pidfile(vm.stubdom_xid)):
- return
- vm.log.info('Starting GUI (stubdomain)')
- guid_cmd = self.common_guid_args(vm)
- guid_cmd.extend(['-d', str(vm.stubdom_xid), '-t', str(vm.xid)])
- yield from asyncio.create_subprocess_exec(*guid_cmd)
- @asyncio.coroutine
- def start_gui(self, vm, force_stubdom=False, monitor_layout=None):
- '''Start GUI daemon regardless of start event.
- This function is a coroutine.
- :param vm: VM for which GUI daemon should be started
- :param force_stubdom: Force GUI daemon for stubdomain, even if the
- one for target AppVM is running.
- '''
- if not vm.features.check_with_template('gui', True):
- return
- if vm.virt_mode == 'hvm':
- yield from self.start_gui_for_stubdomain(vm,
- force=force_stubdom)
- if not os.path.exists(self.guid_pidfile(vm.xid)):
- yield from self.start_gui_for_vm(vm, monitor_layout=monitor_layout)
- @asyncio.coroutine
- def send_monitor_layout(self, vm, layout=None, startup=False):
- '''Send monitor layout to a given VM
- This function is a coroutine.
- :param vm: VM to which send monitor layout
- :param layout: monitor layout to send; if None, fetch it from
- local X server.
- :param startup:
- :return: None
- '''
- # pylint: disable=no-self-use
- if vm.features.check_with_template('no-monitor-layout', False) \
- or not vm.is_running():
- return
- if layout is None:
- layout = get_monitor_layout()
- if not layout:
- return
- vm.log.info('Sending monitor layout')
- if not startup:
- with open(self.guid_pidfile(vm.xid)) as pidfile:
- pid = int(pidfile.read())
- os.kill(pid, signal.SIGHUP)
- try:
- with open(self.guid_pidfile(vm.stubdom_xid)) as pidfile:
- pid = int(pidfile.read())
- os.kill(pid, signal.SIGHUP)
- except FileNotFoundError:
- pass
- try:
- yield from asyncio.get_event_loop().run_in_executor(None,
- vm.run_service_for_stdio, 'qubes.SetMonitorLayout',
- ''.join(layout).encode())
- except subprocess.CalledProcessError as e:
- vm.log.warning('Failed to send monitor layout: %s', e.stderr)
- def send_monitor_layout_all(self):
- '''Send monitor layout to all (running) VMs'''
- monitor_layout = get_monitor_layout()
- for vm in self.app.domains:
- if vm.klass == 'AdminVM':
- continue
- if vm.is_running():
- if not vm.features.check_with_template('gui', True):
- continue
- asyncio.ensure_future(self.send_monitor_layout(vm,
- monitor_layout))
- def on_domain_spawn(self, vm, _event, **kwargs):
- '''Handler of 'domain-spawn' event, starts GUI daemon for stubdomain'''
- if not vm.features.check_with_template('gui', True):
- return
- if vm.virt_mode == 'hvm' and kwargs.get('start_guid', 'True') == 'True':
- asyncio.ensure_future(self.start_gui_for_stubdomain(vm))
- def on_domain_start(self, vm, _event, **kwargs):
- '''Handler of 'domain-start' event, starts GUI daemon for actual VM'''
- if not vm.features.check_with_template('gui', True):
- return
- if kwargs.get('start_guid', 'True') == 'True':
- asyncio.ensure_future(self.start_gui_for_vm(vm))
- def on_connection_established(self, _subject, _event, **_kwargs):
- '''Handler of 'connection-established' event, used to launch GUI
- daemon for domains started before this tool. '''
- monitor_layout = get_monitor_layout()
- self.app.domains.clear_cache()
- for vm in self.app.domains:
- if vm.klass == 'AdminVM':
- continue
- if not vm.features.check_with_template('gui', True):
- continue
- power_state = vm.get_power_state()
- if power_state == 'Running':
- asyncio.ensure_future(self.start_gui(vm,
- monitor_layout=monitor_layout))
- elif power_state == 'Transient':
- # it is still starting, we'll get 'domain-start' event when
- # fully started
- if vm.virt_mode == 'hvm':
- asyncio.ensure_future(self.start_gui_for_stubdomain(vm))
- def register_events(self, events):
- '''Register domain startup events in app.events dispatcher'''
- events.add_handler('domain-spawn', self.on_domain_spawn)
- events.add_handler('domain-start', self.on_domain_start)
- events.add_handler('connection-established',
- self.on_connection_established)
- if 'XDG_RUNTIME_DIR' in os.environ:
- pidfile_path = os.path.join(os.environ['XDG_RUNTIME_DIR'],
- 'qvm-start-gui.pid')
- else:
- pidfile_path = os.path.join(os.environ.get('HOME', '/'),
- '.qvm-start-gui.pid')
- parser = qubesadmin.tools.QubesArgumentParser(
- description='start GUI for qube(s)', vmname_nargs='*')
- parser.add_argument('--watch', action='store_true',
- help='Keep watching for further domains startups, must be used with --all')
- parser.add_argument('--force-stubdomain', action='store_true',
- help='Start GUI to stubdomain-emulated VGA, even if gui-agent is running '
- 'in the VM')
- parser.add_argument('--pidfile', action='store', default=pidfile_path,
- help='Pidfile path to create in --watch mode')
- parser.add_argument('--notify-monitor-layout', action='store_true',
- help='Notify running instance in --watch mode about changed monitor layout')
- def main(args=None):
- ''' Main function of qvm-start-gui tool'''
- args = parser.parse_args(args)
- if args.watch and not args.all_domains:
- parser.error('--watch option must be used with --all')
- if args.watch and args.notify_monitor_layout:
- parser.error('--watch cannot be used with --notify-monitor-layout')
- launcher = GUILauncher(args.app)
- if args.watch:
- if not have_events:
- parser.error('--watch option require Python >= 3.5')
- with daemon.pidfile.TimeoutPIDLockFile(args.pidfile):
- loop = asyncio.get_event_loop()
- # pylint: disable=no-member
- events = qubesadmin.events.EventsDispatcher(args.app)
- # pylint: enable=no-member
- launcher.register_events(events)
- events_listener = asyncio.ensure_future(events.listen_for_events())
- for signame in ('SIGINT', 'SIGTERM'):
- loop.add_signal_handler(getattr(signal, signame),
- events_listener.cancel) # pylint: disable=no-member
- loop.add_signal_handler(signal.SIGHUP,
- launcher.send_monitor_layout_all)
- try:
- loop.run_until_complete(events_listener)
- except asyncio.CancelledError:
- pass
- loop.stop()
- loop.run_forever()
- loop.close()
- elif args.notify_monitor_layout:
- try:
- with open(pidfile_path, 'r') as pidfile:
- pid = int(pidfile.read().strip())
- os.kill(pid, signal.SIGHUP)
- except (FileNotFoundError, ValueError) as e:
- parser.error('Cannot open pidfile {}: {}'.format(pidfile_path,
- str(e)))
- else:
- loop = asyncio.get_event_loop()
- tasks = []
- for vm in args.domains:
- if vm.is_running():
- tasks.append(asyncio.ensure_future(launcher.start_gui(
- vm, force_stubdom=args.force_stubdomain)))
- if tasks:
- loop.run_until_complete(asyncio.wait(tasks))
- loop.stop()
- loop.run_forever()
- loop.close()
- if __name__ == '__main__':
- main()
|