2017-01-20 12:40:00 +01:00
|
|
|
#!/usr/bin/python3 -O
|
2015-09-28 17:44:59 +02:00
|
|
|
# vim: fileencoding=utf-8
|
|
|
|
|
|
|
|
import os
|
2016-03-20 20:29:46 +01:00
|
|
|
|
2015-09-28 17:44:59 +02:00
|
|
|
import setuptools
|
2018-01-18 22:13:37 +01:00
|
|
|
import setuptools.command.install
|
2015-09-28 17:44:59 +02:00
|
|
|
|
2016-03-20 20:29:46 +01:00
|
|
|
|
2015-09-28 17:44:59 +02:00
|
|
|
# don't import: import * is unreliable and there is no need, since this is
|
|
|
|
# compile time and we have source files
|
|
|
|
def get_console_scripts():
|
|
|
|
for filename in os.listdir('./qubes/tools'):
|
|
|
|
basename, ext = os.path.splitext(os.path.basename(filename))
|
|
|
|
if basename == '__init__' or ext != '.py':
|
|
|
|
continue
|
2018-01-18 22:13:37 +01:00
|
|
|
yield basename.replace('_', '-'), 'qubes.tools.{}'.format(basename)
|
2015-09-28 17:44:59 +02:00
|
|
|
|
2018-01-18 22:13:37 +01:00
|
|
|
# create simple scripts that run much faster than "console entry points"
|
|
|
|
class CustomInstall(setuptools.command.install.install):
|
|
|
|
def run(self):
|
|
|
|
bin = os.path.join(self.root, "usr/bin")
|
|
|
|
try:
|
|
|
|
os.makedirs(bin)
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
for file, pkg in get_console_scripts():
|
|
|
|
path = os.path.join(bin, file)
|
|
|
|
with open(path, "w") as f:
|
|
|
|
f.write(
|
|
|
|
"""#!/usr/bin/python3
|
|
|
|
from {} import main
|
|
|
|
import sys
|
|
|
|
if __name__ == '__main__':
|
|
|
|
sys.exit(main())
|
|
|
|
""".format(pkg))
|
|
|
|
|
|
|
|
os.chmod(path, 0o755)
|
|
|
|
setuptools.command.install.install.run(self)
|
2016-03-20 20:29:46 +01:00
|
|
|
|
2015-09-28 17:44:59 +02:00
|
|
|
if __name__ == '__main__':
|
|
|
|
setuptools.setup(
|
|
|
|
name='qubes',
|
|
|
|
version=open('version').read().strip(),
|
|
|
|
author='Invisible Things Lab',
|
|
|
|
author_email='woju@invisiblethingslab.com',
|
|
|
|
description='Qubes core package',
|
|
|
|
license='GPL2+',
|
|
|
|
url='https://www.qubes-os.org/',
|
|
|
|
packages=setuptools.find_packages(exclude=('core*', 'tests')),
|
2018-01-18 22:13:37 +01:00
|
|
|
cmdclass={
|
|
|
|
'install': CustomInstall,
|
|
|
|
},
|
2015-09-28 17:44:59 +02:00
|
|
|
entry_points={
|
2016-03-04 13:03:43 +01:00
|
|
|
'qubes.vm': [
|
|
|
|
'AppVM = qubes.vm.appvm:AppVM',
|
|
|
|
'TemplateVM = qubes.vm.templatevm:TemplateVM',
|
2016-03-13 12:43:26 +01:00
|
|
|
'StandaloneVM = qubes.vm.standalonevm:StandaloneVM',
|
2016-03-04 13:03:43 +01:00
|
|
|
'AdminVM = qubes.vm.adminvm:AdminVM',
|
2016-05-20 03:58:57 +02:00
|
|
|
'DispVM = qubes.vm.dispvm:DispVM',
|
2016-03-04 13:03:43 +01:00
|
|
|
],
|
|
|
|
'qubes.ext': [
|
2017-06-14 11:47:52 +02:00
|
|
|
'qubes.ext.admin = qubes.ext.admin:AdminExtension',
|
2017-06-12 12:22:39 +02:00
|
|
|
'qubes.ext.core_features = qubes.ext.core_features:CoreFeatures',
|
2016-03-04 13:03:43 +01:00
|
|
|
'qubes.ext.qubesmanager = qubes.ext.qubesmanager:QubesManager',
|
2016-03-05 10:57:58 +01:00
|
|
|
'qubes.ext.gui = qubes.ext.gui:GUI',
|
2020-02-27 10:31:27 +01:00
|
|
|
'qubes.ext.audio = qubes.ext.audio:AUDIO',
|
2016-03-07 01:32:40 +01:00
|
|
|
'qubes.ext.r3compatibility = qubes.ext.r3compatibility:R3Compatibility',
|
2016-09-03 02:16:28 +02:00
|
|
|
'qubes.ext.pci = qubes.ext.pci:PCIDeviceExtension',
|
2017-05-29 21:20:06 +02:00
|
|
|
'qubes.ext.block = qubes.ext.block:BlockDeviceExtension',
|
2017-08-14 02:30:52 +02:00
|
|
|
'qubes.ext.services = qubes.ext.services:ServicesExtension',
|
2018-07-09 19:42:18 +02:00
|
|
|
'qubes.ext.windows = qubes.ext.windows:WindowsFeatures',
|
2016-03-04 13:03:43 +01:00
|
|
|
],
|
2016-03-17 13:06:13 +01:00
|
|
|
'qubes.devices': [
|
2016-09-03 02:16:28 +02:00
|
|
|
'pci = qubes.ext.pci:PCIDevice',
|
2017-05-29 21:20:06 +02:00
|
|
|
'block = qubes.ext.block:BlockDevice',
|
2016-06-26 04:07:15 +02:00
|
|
|
'testclass = qubes.tests.devices:TestDevice',
|
2016-03-17 13:06:13 +01:00
|
|
|
],
|
2016-03-20 20:29:46 +01:00
|
|
|
'qubes.storage': [
|
2016-04-30 20:42:46 +02:00
|
|
|
'file = qubes.storage.file:FilePool',
|
file-reflink, a storage driver optimized for CoW filesystems
This adds the file-reflink storage driver. It is never selected
automatically for pool creation, especially not the creation of
'varlibqubes' (though it can be used if set up manually).
The code is quite small:
reflink.py lvm.py file.py + block-snapshot
sloccount 334 lines 447 (134%) 570 (171%)
Background: btrfs and XFS (but not yet ZFS) support instant copies of
individual files through the 'FICLONE' ioctl behind 'cp --reflink'.
Which file-reflink uses to snapshot VM image files without an extra
device-mapper layer. All the snapshots are essentially freestanding;
there's no functional origin vs. snapshot distinction.
In contrast to 'file'-on-btrfs, file-reflink inherently avoids
CoW-on-CoW. Which is a bigger issue now on R4.0, where even AppVMs'
private volumes are CoW. (And turning off the lower, filesystem-level
CoW for 'file'-on-btrfs images would turn off data checksums too, i.e.
protection against bit rot.)
Also in contrast to 'file', all storage features are supported,
including
- any number of revisions_to_keep
- volume.revert()
- volume.is_outdated
- online fstrim/discard
Example tree of a file-reflink pool - *-dirty.img are connected to Xen:
- /var/lib/testpool/appvms/foo/volatile-dirty.img
- /var/lib/testpool/appvms/foo/root-dirty.img
- /var/lib/testpool/appvms/foo/root.img
- /var/lib/testpool/appvms/foo/private-dirty.img
- /var/lib/testpool/appvms/foo/private.img
- /var/lib/testpool/appvms/foo/private.img@2018-01-02T03:04:05Z
- /var/lib/testpool/appvms/foo/private.img@2018-01-02T04:05:06Z
- /var/lib/testpool/appvms/foo/private.img@2018-01-02T05:06:07Z
- /var/lib/testpool/appvms/bar/...
- /var/lib/testpool/appvms/...
- /var/lib/testpool/template-vms/fedora-26/...
- /var/lib/testpool/template-vms/...
It looks similar to a 'file' pool tree, and in fact file-reflink is
drop-in compatible:
$ qvm-shutdown --all --wait
$ systemctl stop qubesd
$ sed 's/ driver="file"/ driver="file-reflink"/g' -i.bak /var/lib/qubes/qubes.xml
$ systemctl start qubesd
$ sudo rm -f /path/to/pool/*/*/*-cow.img*
If the user tries to create a fresh file-reflink pool on a filesystem
that doesn't support reflinks, qvm-pool will abort and mention the
'setup_check=no' option. Which can be passed to force a fallback on
regular sparse copies, with of course lots of time/space overhead. The
same fallback code is also used when initially cloning a VM from a
foreign pool, or from another file-reflink pool on a different
mountpoint.
'journalctl -fu qubesd' will show all file-reflink copy/rename/remove
operations on VM creation/startup/shutdown/etc.
2018-02-12 22:20:05 +01:00
|
|
|
'file-reflink = qubes.storage.reflink:ReflinkPool',
|
2016-04-01 15:10:44 +02:00
|
|
|
'linux-kernel = qubes.storage.kernels:LinuxKernel',
|
2016-07-12 18:44:05 +02:00
|
|
|
'lvm_thin = qubes.storage.lvm:ThinPool',
|
2017-04-26 01:01:52 +02:00
|
|
|
],
|
|
|
|
'qubes.tests.storage': [
|
|
|
|
'test = qubes.tests.storage:TestPool',
|
|
|
|
'file = qubes.storage.file:FilePool',
|
file-reflink, a storage driver optimized for CoW filesystems
This adds the file-reflink storage driver. It is never selected
automatically for pool creation, especially not the creation of
'varlibqubes' (though it can be used if set up manually).
The code is quite small:
reflink.py lvm.py file.py + block-snapshot
sloccount 334 lines 447 (134%) 570 (171%)
Background: btrfs and XFS (but not yet ZFS) support instant copies of
individual files through the 'FICLONE' ioctl behind 'cp --reflink'.
Which file-reflink uses to snapshot VM image files without an extra
device-mapper layer. All the snapshots are essentially freestanding;
there's no functional origin vs. snapshot distinction.
In contrast to 'file'-on-btrfs, file-reflink inherently avoids
CoW-on-CoW. Which is a bigger issue now on R4.0, where even AppVMs'
private volumes are CoW. (And turning off the lower, filesystem-level
CoW for 'file'-on-btrfs images would turn off data checksums too, i.e.
protection against bit rot.)
Also in contrast to 'file', all storage features are supported,
including
- any number of revisions_to_keep
- volume.revert()
- volume.is_outdated
- online fstrim/discard
Example tree of a file-reflink pool - *-dirty.img are connected to Xen:
- /var/lib/testpool/appvms/foo/volatile-dirty.img
- /var/lib/testpool/appvms/foo/root-dirty.img
- /var/lib/testpool/appvms/foo/root.img
- /var/lib/testpool/appvms/foo/private-dirty.img
- /var/lib/testpool/appvms/foo/private.img
- /var/lib/testpool/appvms/foo/private.img@2018-01-02T03:04:05Z
- /var/lib/testpool/appvms/foo/private.img@2018-01-02T04:05:06Z
- /var/lib/testpool/appvms/foo/private.img@2018-01-02T05:06:07Z
- /var/lib/testpool/appvms/bar/...
- /var/lib/testpool/appvms/...
- /var/lib/testpool/template-vms/fedora-26/...
- /var/lib/testpool/template-vms/...
It looks similar to a 'file' pool tree, and in fact file-reflink is
drop-in compatible:
$ qvm-shutdown --all --wait
$ systemctl stop qubesd
$ sed 's/ driver="file"/ driver="file-reflink"/g' -i.bak /var/lib/qubes/qubes.xml
$ systemctl start qubesd
$ sudo rm -f /path/to/pool/*/*/*-cow.img*
If the user tries to create a fresh file-reflink pool on a filesystem
that doesn't support reflinks, qvm-pool will abort and mention the
'setup_check=no' option. Which can be passed to force a fallback on
regular sparse copies, with of course lots of time/space overhead. The
same fallback code is also used when initially cloning a VM from a
foreign pool, or from another file-reflink pool on a different
mountpoint.
'journalctl -fu qubesd' will show all file-reflink copy/rename/remove
operations on VM creation/startup/shutdown/etc.
2018-02-12 22:20:05 +01:00
|
|
|
'file-reflink = qubes.storage.reflink:ReflinkPool',
|
2017-04-26 01:01:52 +02:00
|
|
|
'linux-kernel = qubes.storage.kernels:LinuxKernel',
|
|
|
|
'lvm_thin = qubes.storage.lvm:ThinPool',
|
|
|
|
],
|
2016-03-20 20:29:46 +01:00
|
|
|
})
|