2017-06-14 11:47:52 +02:00
|
|
|
# -*- encoding: utf8 -*-
|
|
|
|
#
|
|
|
|
# The Qubes OS Project, http://www.qubes-os.org
|
|
|
|
#
|
|
|
|
# Copyright (C) 2017 Wojtek Porczyk <woju@invisiblethingslab.com>
|
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# This library is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU Lesser General Public
|
|
|
|
# License as published by the Free Software Foundation; either
|
|
|
|
# version 2.1 of the License, or (at your option) any later version.
|
2017-06-14 11:47:52 +02:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# This library is distributed in the hope that it will be useful,
|
2017-06-14 11:47:52 +02:00
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2017-10-12 00:11:50 +02:00
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
# Lesser General Public License for more details.
|
2017-06-14 11:47:52 +02:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# You should have received a copy of the GNU Lesser General Public
|
|
|
|
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
2017-06-14 11:47:52 +02:00
|
|
|
|
|
|
|
import qubes.api
|
2020-02-21 03:54:14 +01:00
|
|
|
import qubes.api.internal
|
2017-06-14 11:47:52 +02:00
|
|
|
import qubes.ext
|
2017-07-17 02:42:36 +02:00
|
|
|
import qubes.vm.adminvm
|
2020-02-21 03:54:14 +01:00
|
|
|
from qrexec.policy import utils, parser
|
|
|
|
|
|
|
|
|
|
|
|
class JustEvaluateAskResolution(parser.AskResolution):
|
2020-04-30 21:22:29 +02:00
|
|
|
async def execute(self, caller_ident):
|
2020-02-21 03:54:14 +01:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class JustEvaluateAllowResolution(parser.AllowResolution):
|
2020-04-30 21:22:29 +02:00
|
|
|
async def execute(self, caller_ident):
|
2020-02-21 03:54:14 +01:00
|
|
|
pass
|
|
|
|
|
2017-06-14 11:47:52 +02:00
|
|
|
|
|
|
|
class AdminExtension(qubes.ext.Extension):
|
2020-02-21 03:54:14 +01:00
|
|
|
def __init__(self):
|
|
|
|
super(AdminExtension, self).__init__()
|
2020-03-31 01:57:22 +02:00
|
|
|
# during tests, __init__() of the extension can be called multiple
|
|
|
|
# times, because there are multiple Qubes() object instances
|
|
|
|
if not hasattr(self, 'policy_cache'):
|
|
|
|
self.policy_cache = utils.PolicyCache(lazy_load=True)
|
|
|
|
self.policy_cache.initialize_watcher()
|
2020-02-21 03:54:14 +01:00
|
|
|
|
2017-06-14 11:47:52 +02:00
|
|
|
# pylint: disable=too-few-public-methods
|
|
|
|
@qubes.ext.handler(
|
2017-07-17 02:41:42 +02:00
|
|
|
'admin-permission:admin.vm.tag.Set',
|
|
|
|
'admin-permission:admin.vm.tag.Remove')
|
2017-06-14 11:47:52 +02:00
|
|
|
def on_tag_set_or_remove(self, vm, event, arg, **kwargs):
|
|
|
|
'''Forbid changing specific tags'''
|
|
|
|
# pylint: disable=no-self-use,unused-argument
|
2017-07-17 02:42:36 +02:00
|
|
|
if arg.startswith('created-by-') and \
|
|
|
|
not isinstance(vm, qubes.vm.adminvm.AdminVM):
|
2017-06-22 13:21:37 +02:00
|
|
|
raise qubes.api.PermissionDenied(
|
|
|
|
'changing this tag is prohibited by {}.{}'.format(
|
|
|
|
__name__, type(self).__name__))
|
2017-06-14 11:47:52 +02:00
|
|
|
|
2017-06-22 13:21:37 +02:00
|
|
|
# TODO create that tag here (need to figure out how to pass mgmtvm name)
|
2020-02-21 03:54:14 +01:00
|
|
|
|
|
|
|
@qubes.ext.handler('admin-permission:admin.vm.List')
|
|
|
|
def admin_vm_list(self, vm, event, arg, **kwargs):
|
|
|
|
'''When called with target 'dom0' (aka "get full list"), exclude domains
|
|
|
|
that the caller don't have permission to list
|
|
|
|
'''
|
|
|
|
# pylint: disable=unused-argument
|
|
|
|
|
|
|
|
if vm.klass == 'AdminVM':
|
|
|
|
# dom0 can always list everything
|
|
|
|
return None
|
|
|
|
|
|
|
|
policy = self.policy_cache.get_policy()
|
|
|
|
system_info = qubes.api.internal.get_system_info(vm.app)
|
|
|
|
|
|
|
|
def filter_vms(dest_vm):
|
|
|
|
request = parser.Request(
|
|
|
|
'admin.vm.List',
|
|
|
|
'+' + arg,
|
|
|
|
vm.name,
|
|
|
|
dest_vm.name,
|
|
|
|
system_info=system_info,
|
|
|
|
ask_resolution_type=JustEvaluateAskResolution,
|
|
|
|
allow_resolution_type=JustEvaluateAllowResolution)
|
|
|
|
try:
|
|
|
|
resolution = policy.evaluate(request)
|
|
|
|
# do not consider 'ask' as allow here,
|
|
|
|
# this needs to be not interactive
|
|
|
|
return isinstance(resolution, parser.AllowResolution)
|
|
|
|
except parser.AccessDenied:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return (filter_vms,)
|
|
|
|
|
|
|
|
@qubes.ext.handler('admin-permission:admin.Events')
|
|
|
|
def admin_events(self, vm, event, arg, **kwargs):
|
|
|
|
'''When called with target 'dom0' (aka "get all events"),
|
|
|
|
exclude domains that the caller don't have permission to receive
|
|
|
|
events about
|
|
|
|
'''
|
|
|
|
# pylint: disable=unused-argument
|
|
|
|
|
|
|
|
if vm.klass == 'AdminVM':
|
|
|
|
# dom0 can always list everything
|
|
|
|
return None
|
|
|
|
|
|
|
|
def filter_events(event):
|
|
|
|
subject, event, kwargs = event
|
|
|
|
try:
|
|
|
|
dest = subject.name
|
|
|
|
except AttributeError:
|
|
|
|
# domain-add and similar events fired on the Qubes() object
|
|
|
|
if 'vm' in kwargs:
|
|
|
|
dest = kwargs['vm'].name
|
|
|
|
else:
|
|
|
|
dest = '@adminvm'
|
|
|
|
|
|
|
|
policy = self.policy_cache.get_policy()
|
|
|
|
# TODO: cache system_info (based on last qubes.xml write time?)
|
|
|
|
system_info = qubes.api.internal.get_system_info(vm.app)
|
|
|
|
request = parser.Request(
|
|
|
|
'admin.Events',
|
|
|
|
'+' + event.replace(':', '_'),
|
|
|
|
vm.name,
|
|
|
|
dest,
|
|
|
|
system_info=system_info,
|
|
|
|
ask_resolution_type=JustEvaluateAskResolution,
|
|
|
|
allow_resolution_type=JustEvaluateAllowResolution)
|
|
|
|
try:
|
|
|
|
resolution = policy.evaluate(request)
|
|
|
|
# do not consider 'ask' as allow here,
|
|
|
|
# this needs to be not interactive
|
|
|
|
return isinstance(resolution, parser.AllowResolution)
|
|
|
|
except parser.AccessDenied:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return (filter_events,)
|
|
|
|
|
|
|
|
@qubes.ext.handler('qubes-close', system=True)
|
|
|
|
def on_qubes_close(self, app, event, **kwargs):
|
|
|
|
"""Unregister policy file watches on app.close()."""
|
|
|
|
# pylint: disable=unused-argument
|
2020-03-31 01:57:22 +02:00
|
|
|
if hasattr(self, 'policy_cache'):
|
|
|
|
self.policy_cache.cleanup()
|
|
|
|
del self.policy_cache
|
2019-09-15 03:38:37 +02:00
|
|
|
|
|
|
|
@qubes.ext.handler('domain-tag-add:created-by-*')
|
|
|
|
def on_tag_add(self, vm, event, tag, **kwargs):
|
|
|
|
'''Add extra tags based on creators 'tag-created-vm-with' feature'''
|
|
|
|
# pylint: disable=unused-argument,no-self-use
|
|
|
|
created_by = vm.app.domains[tag.partition('created-by-')[2]]
|
|
|
|
tag_with = created_by.features.get('tag-created-vm-with', '')
|
|
|
|
for tag_with_single in tag_with.split():
|
|
|
|
vm.tags.add(tag_with_single)
|