2016-03-05 10:57:58 +01:00
|
|
|
#
|
|
|
|
# The Qubes OS Project, https://www.qubes-os.org/
|
|
|
|
#
|
|
|
|
# Copyright (C) 2010-2016 Joanna Rutkowska <joanna@invisiblethingslab.com>
|
|
|
|
# Copyright (C) 2013-2016 Marek Marczykowski-Górecki
|
|
|
|
# <marmarek@invisiblethingslab.com>
|
2018-11-13 19:07:47 +01:00
|
|
|
# Copyright (C) 2014-2018 Wojtek Porczyk <woju@invisiblethingslab.com>
|
2019-11-09 13:20:14 +01:00
|
|
|
# Copyright (C) 2019 Frédéric Pierret <frederic.pierret@qubes-os.org>
|
2016-03-05 10:57:58 +01:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# This library is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU Lesser General Public
|
|
|
|
# License as published by the Free Software Foundation; either
|
|
|
|
# version 2.1 of the License, or (at your option) any later version.
|
2016-03-05 10:57:58 +01:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# This library is distributed in the hope that it will be useful,
|
2016-03-05 10:57:58 +01:00
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2017-10-12 00:11:50 +02:00
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
# Lesser General Public License for more details.
|
2016-03-05 10:57:58 +01:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# You should have received a copy of the GNU Lesser General Public
|
|
|
|
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
2016-03-05 10:57:58 +01:00
|
|
|
#
|
|
|
|
|
2020-03-17 15:39:38 +01:00
|
|
|
import re
|
|
|
|
|
2016-03-05 10:57:58 +01:00
|
|
|
import qubes.config
|
|
|
|
import qubes.ext
|
2020-03-17 15:39:38 +01:00
|
|
|
import qubes.exc
|
2016-03-05 10:57:58 +01:00
|
|
|
|
2016-03-17 11:52:52 +01:00
|
|
|
|
2016-03-05 10:57:58 +01:00
|
|
|
class GUI(qubes.ext.Extension):
|
2020-02-27 10:31:28 +01:00
|
|
|
# pylint: disable=too-few-public-methods,unused-argument,no-self-use
|
|
|
|
@staticmethod
|
|
|
|
def attached_vms(vm):
|
|
|
|
for domain in vm.app.domains:
|
|
|
|
if getattr(domain, 'guivm', None) and domain.guivm == vm:
|
|
|
|
yield domain
|
|
|
|
|
|
|
|
@qubes.ext.handler('domain-pre-shutdown')
|
|
|
|
def on_domain_pre_shutdown(self, vm, event, **kwargs):
|
|
|
|
attached_vms = [domain for domain in self.attached_vms(vm) if
|
|
|
|
domain.is_running()]
|
|
|
|
if attached_vms and not kwargs.get('force', False):
|
|
|
|
raise qubes.exc.QubesVMError(
|
|
|
|
self, 'There are running VMs using this VM as GuiVM: '
|
|
|
|
'{}'.format(', '.join(vm.name for vm in attached_vms)))
|
|
|
|
|
2016-03-16 18:07:49 +01:00
|
|
|
@staticmethod
|
|
|
|
def send_gui_mode(vm):
|
|
|
|
vm.run_service('qubes.SetGuiMode',
|
2019-10-20 12:21:09 +02:00
|
|
|
input=('SEAMLESS'
|
|
|
|
if vm.features.get('gui-seamless', False)
|
|
|
|
else 'FULLSCREEN'))
|
2018-11-13 19:07:47 +01:00
|
|
|
|
2020-02-27 10:31:28 +01:00
|
|
|
@qubes.ext.handler('domain-init', 'domain-load')
|
|
|
|
def on_domain_init_load(self, vm, event):
|
|
|
|
if getattr(vm, 'guivm', None):
|
2020-03-08 10:27:25 +01:00
|
|
|
if 'guivm-' + vm.guivm.name not in vm.tags:
|
2020-02-27 10:31:29 +01:00
|
|
|
self.on_property_set(vm, event, name='guivm', newvalue=vm.guivm)
|
2020-02-27 10:31:28 +01:00
|
|
|
|
2019-11-09 13:20:14 +01:00
|
|
|
# property-del <=> property-reset-to-default
|
|
|
|
@qubes.ext.handler('property-del:guivm')
|
|
|
|
def on_property_del(self, subject, event, name, oldvalue=None):
|
|
|
|
newvalue = getattr(subject, 'guivm', None)
|
|
|
|
self.on_property_set(subject, event, name, newvalue, oldvalue)
|
|
|
|
|
2019-10-20 12:44:27 +02:00
|
|
|
@qubes.ext.handler('property-set:guivm')
|
|
|
|
def on_property_set(self, subject, event, name, newvalue, oldvalue=None):
|
|
|
|
# Clean other 'guivm-XXX' tags.
|
|
|
|
# gui-daemon can connect to only one domain
|
|
|
|
tags_list = list(subject.tags)
|
|
|
|
for tag in tags_list:
|
2020-02-27 10:31:29 +01:00
|
|
|
if tag.startswith('guivm-'):
|
2019-10-20 12:44:27 +02:00
|
|
|
subject.tags.remove(tag)
|
|
|
|
|
2019-11-09 13:20:14 +01:00
|
|
|
if newvalue:
|
|
|
|
guivm = 'guivm-' + newvalue.name
|
|
|
|
subject.tags.add(guivm)
|
2019-10-20 12:44:27 +02:00
|
|
|
|
2018-11-13 19:07:47 +01:00
|
|
|
@qubes.ext.handler('domain-qdb-create')
|
|
|
|
def on_domain_qdb_create(self, vm, event):
|
|
|
|
for feature in ('gui-videoram-overhead', 'gui-videoram-min'):
|
|
|
|
try:
|
2019-10-20 12:21:09 +02:00
|
|
|
vm.untrusted_qdb.write(
|
|
|
|
'/qubes-{}'.format(feature),
|
|
|
|
vm.features.check_with_template_and_adminvm(
|
|
|
|
feature))
|
2018-11-13 19:07:47 +01:00
|
|
|
except KeyError:
|
|
|
|
pass
|
2019-10-20 12:44:27 +02:00
|
|
|
|
|
|
|
# Add GuiVM Xen ID for gui-daemon
|
2019-10-20 17:35:43 +02:00
|
|
|
if getattr(vm, 'guivm', None):
|
2020-02-27 10:31:29 +01:00
|
|
|
if vm != vm.guivm and vm.guivm.is_running():
|
2019-10-20 17:35:43 +02:00
|
|
|
vm.untrusted_qdb.write('/qubes-gui-domain-xid',
|
|
|
|
str(vm.guivm.xid))
|
2019-10-19 19:16:25 +02:00
|
|
|
|
2019-10-20 17:35:43 +02:00
|
|
|
# Add keyboard layout from that of GuiVM
|
|
|
|
kbd_layout = vm.guivm.features.get('keyboard-layout', None)
|
|
|
|
if kbd_layout:
|
|
|
|
vm.untrusted_qdb.write('/keyboard-layout', kbd_layout)
|
2019-11-06 20:36:34 +01:00
|
|
|
|
|
|
|
# Set GuiVM prefix
|
|
|
|
guivm_windows_prefix = vm.features.get('guivm-windows-prefix', 'GuiVM')
|
|
|
|
if vm.features.get('service.guivm-gui-agent', None):
|
|
|
|
vm.untrusted_qdb.write('/guivm-windows-prefix',
|
|
|
|
guivm_windows_prefix)
|
2019-11-09 13:20:14 +01:00
|
|
|
|
|
|
|
@qubes.ext.handler('property-set:default_guivm', system=True)
|
|
|
|
def on_property_set_default_guivm(self, app, event, name, newvalue,
|
|
|
|
oldvalue=None):
|
|
|
|
for vm in app.domains:
|
|
|
|
if hasattr(vm, 'guivm') and vm.property_is_default('guivm'):
|
|
|
|
vm.fire_event('property-set:guivm',
|
|
|
|
name='guivm', newvalue=newvalue,
|
|
|
|
oldvalue=oldvalue)
|
2020-02-27 10:31:29 +01:00
|
|
|
|
|
|
|
@qubes.ext.handler('domain-start')
|
|
|
|
def on_domain_start(self, vm, event, **kwargs):
|
|
|
|
attached_vms = [domain for domain in self.attached_vms(vm) if
|
|
|
|
domain.is_running()]
|
|
|
|
for attached_vm in attached_vms:
|
|
|
|
attached_vm.untrusted_qdb.write('/qubes-gui-domain-xid',
|
|
|
|
str(vm.xid))
|
2020-03-17 15:39:38 +01:00
|
|
|
|
|
|
|
@qubes.ext.handler('domain-feature-pre-set:keyboard-layout')
|
|
|
|
def on_feature_pre_set(self, subject, event, feature, value, oldvalue=None):
|
|
|
|
untrusted_xkb_layout = value.split('+')
|
2020-03-18 14:17:04 +01:00
|
|
|
if len(untrusted_xkb_layout) != 3:
|
2020-03-18 09:46:21 +01:00
|
|
|
raise qubes.exc.QubesValueError("Invalid number of parameters")
|
2020-03-17 15:39:38 +01:00
|
|
|
|
|
|
|
untrusted_layout = untrusted_xkb_layout[0]
|
|
|
|
untrusted_variant = untrusted_xkb_layout[1]
|
|
|
|
untrusted_options = untrusted_xkb_layout[2]
|
|
|
|
|
2020-03-18 09:46:21 +01:00
|
|
|
re_variant = r'^[a-zA-Z0-9-_]*$'
|
|
|
|
re_options = r'^[a-zA-Z0-9-_:,]*$'
|
2020-03-17 15:39:38 +01:00
|
|
|
|
2020-03-18 09:46:21 +01:00
|
|
|
if not untrusted_layout.isalpha():
|
|
|
|
raise qubes.exc.QubesValueError("Invalid layout provided")
|
2020-03-18 14:17:04 +01:00
|
|
|
if not re.match(re_variant, untrusted_variant):
|
2020-03-18 09:46:21 +01:00
|
|
|
raise qubes.exc.QubesValueError("Invalid variant provided")
|
2020-03-18 14:17:04 +01:00
|
|
|
if not re.match(re_options, untrusted_options):
|
2020-03-18 09:46:21 +01:00
|
|
|
raise qubes.exc.QubesValueError("Invalid options provided")
|