2020-01-16 14:41:00 +01:00
|
|
|
# -*- encoding: utf-8 -*-
|
2017-03-21 11:48:20 +01:00
|
|
|
#
|
|
|
|
# The Qubes OS Project, http://www.qubes-os.org
|
|
|
|
#
|
|
|
|
# Copyright (C) 2017 Marek Marczykowski-Górecki
|
|
|
|
# <marmarek@invisiblethingslab.com>
|
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# This library is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU Lesser General Public
|
|
|
|
# License as published by the Free Software Foundation; either
|
|
|
|
# version 2.1 of the License, or (at your option) any later version.
|
2017-03-21 11:48:20 +01:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# This library is distributed in the hope that it will be useful,
|
2017-03-21 11:48:20 +01:00
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2017-10-12 00:11:50 +02:00
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
# Lesser General Public License for more details.
|
2017-03-21 11:48:20 +01:00
|
|
|
#
|
2017-10-12 00:11:50 +02:00
|
|
|
# You should have received a copy of the GNU Lesser General Public
|
|
|
|
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
|
2017-03-21 11:48:20 +01:00
|
|
|
|
|
|
|
''' Internal interface for dom0 components to communicate with qubesd. '''
|
|
|
|
|
|
|
|
import asyncio
|
|
|
|
import json
|
2017-06-02 20:34:53 +02:00
|
|
|
import subprocess
|
2017-03-21 11:48:20 +01:00
|
|
|
|
2017-05-12 19:07:41 +02:00
|
|
|
import qubes.api
|
|
|
|
import qubes.api.admin
|
2017-06-02 20:34:53 +02:00
|
|
|
import qubes.vm.adminvm
|
2017-03-21 11:48:20 +01:00
|
|
|
import qubes.vm.dispvm
|
|
|
|
|
|
|
|
|
2020-02-20 05:38:50 +01:00
|
|
|
def get_system_info(app):
|
|
|
|
system_info = {'domains': {
|
|
|
|
domain.name: {
|
|
|
|
'tags': list(domain.tags),
|
|
|
|
'type': domain.__class__.__name__,
|
|
|
|
'template_for_dispvms':
|
|
|
|
getattr(domain, 'template_for_dispvms', False),
|
|
|
|
'default_dispvm': (domain.default_dispvm.name if
|
|
|
|
getattr(domain, 'default_dispvm', None) else None),
|
|
|
|
'icon': str(domain.label.icon),
|
|
|
|
'guivm': (domain.guivm.name if getattr(domain, 'guivm', None)
|
|
|
|
else None),
|
|
|
|
} for domain in app.domains
|
|
|
|
}}
|
|
|
|
return system_info
|
|
|
|
|
|
|
|
|
2017-05-12 19:07:41 +02:00
|
|
|
class QubesInternalAPI(qubes.api.AbstractQubesAPI):
|
2017-03-21 11:48:20 +01:00
|
|
|
''' Communication interface for dom0 components,
|
|
|
|
by design the input here is trusted.'''
|
|
|
|
|
2017-06-06 15:49:19 +02:00
|
|
|
SOCKNAME = '/var/run/qubesd.internal.sock'
|
2017-03-21 11:48:20 +01:00
|
|
|
|
2017-05-12 19:14:29 +02:00
|
|
|
@qubes.api.method('internal.GetSystemInfo', no_payload=True)
|
2017-03-21 11:48:20 +01:00
|
|
|
@asyncio.coroutine
|
|
|
|
def getsysteminfo(self):
|
2018-06-11 12:32:05 +02:00
|
|
|
self.enforce(self.dest.name == 'dom0')
|
|
|
|
self.enforce(not self.arg)
|
2017-03-21 11:48:20 +01:00
|
|
|
|
2020-02-20 05:38:50 +01:00
|
|
|
system_info = get_system_info(self.app)
|
2017-03-21 11:48:20 +01:00
|
|
|
|
|
|
|
return json.dumps(system_info)
|
|
|
|
|
2020-01-16 14:41:00 +01:00
|
|
|
@qubes.api.method('internal.vm.volume.ImportBegin',
|
|
|
|
scope='local', write=True)
|
|
|
|
@asyncio.coroutine
|
|
|
|
def vm_volume_import(self, untrusted_payload):
|
|
|
|
"""Begin importing volume data. Payload is either size of new data
|
|
|
|
in bytes, or empty. If empty, the current volume's size will be used.
|
|
|
|
Returns size and path to where data should be written.
|
|
|
|
|
|
|
|
Triggered by scripts in /etc/qubes-rpc:
|
|
|
|
admin.vm.volume.Import, admin.vm.volume.ImportWithSize.
|
|
|
|
|
|
|
|
When the script finish importing, it will trigger
|
|
|
|
internal.vm.volume.ImportEnd (with either b'ok' or b'fail' as a
|
|
|
|
payload) and response from that call will be actually send to the
|
|
|
|
caller.
|
|
|
|
"""
|
|
|
|
self.enforce(self.arg in self.dest.volumes.keys())
|
|
|
|
|
|
|
|
if untrusted_payload:
|
|
|
|
original_method = 'admin.vm.volume.ImportWithSize'
|
|
|
|
else:
|
|
|
|
original_method = 'admin.vm.volume.Import'
|
|
|
|
self.src.fire_event(
|
|
|
|
'admin-permission:' + original_method,
|
|
|
|
pre_event=True, dest=self.dest, arg=self.arg)
|
|
|
|
|
|
|
|
if not self.dest.is_halted():
|
|
|
|
raise qubes.exc.QubesVMNotHaltedError(self.dest)
|
|
|
|
|
|
|
|
requested_size = None
|
|
|
|
if untrusted_payload:
|
|
|
|
try:
|
|
|
|
untrusted_value = int(untrusted_payload.decode('ascii'))
|
|
|
|
except (UnicodeDecodeError, ValueError):
|
|
|
|
raise qubes.api.ProtocolError('Invalid value')
|
|
|
|
self.enforce(untrusted_value > 0)
|
|
|
|
requested_size = untrusted_value
|
|
|
|
del untrusted_value
|
|
|
|
del untrusted_payload
|
|
|
|
|
|
|
|
path = yield from self.dest.storage.import_data(
|
|
|
|
self.arg, requested_size)
|
|
|
|
self.enforce(' ' not in path)
|
|
|
|
if requested_size is None:
|
|
|
|
size = self.dest.volumes[self.arg].size
|
|
|
|
else:
|
|
|
|
size = requested_size
|
|
|
|
|
|
|
|
# when we know the action is allowed, inform extensions that it will
|
|
|
|
# be performed
|
|
|
|
self.dest.fire_event(
|
|
|
|
'domain-volume-import-begin', volume=self.arg, size=size)
|
|
|
|
|
|
|
|
return '{} {}'.format(size, path)
|
|
|
|
|
2017-05-23 15:38:28 +02:00
|
|
|
@qubes.api.method('internal.vm.volume.ImportEnd')
|
|
|
|
@asyncio.coroutine
|
|
|
|
def vm_volume_import_end(self, untrusted_payload):
|
|
|
|
'''
|
|
|
|
This is second half of admin.vm.volume.Import handling. It is called
|
|
|
|
when actual import is finished. Response from this method is sent do
|
|
|
|
the client (as a response for admin.vm.volume.Import call).
|
2020-01-20 18:14:05 +01:00
|
|
|
|
|
|
|
The payload is either 'ok', or 'fail\n<error message>'.
|
2017-05-23 15:38:28 +02:00
|
|
|
'''
|
2018-06-11 12:32:05 +02:00
|
|
|
self.enforce(self.arg in self.dest.volumes.keys())
|
2017-05-23 15:38:28 +02:00
|
|
|
success = untrusted_payload == b'ok'
|
|
|
|
|
|
|
|
try:
|
2018-10-19 01:29:03 +02:00
|
|
|
yield from self.dest.storage.import_data_end(self.arg,
|
|
|
|
success=success)
|
2017-05-23 15:38:28 +02:00
|
|
|
except:
|
|
|
|
self.dest.fire_event('domain-volume-import-end', volume=self.arg,
|
2017-11-21 07:05:06 +01:00
|
|
|
success=False)
|
2017-05-23 15:38:28 +02:00
|
|
|
raise
|
|
|
|
|
|
|
|
self.dest.fire_event('domain-volume-import-end', volume=self.arg,
|
2017-11-21 07:05:06 +01:00
|
|
|
success=success)
|
2017-05-23 15:38:28 +02:00
|
|
|
|
|
|
|
if not success:
|
2020-01-20 18:14:05 +01:00
|
|
|
error = ''
|
|
|
|
parts = untrusted_payload.decode('ascii').split('\n', 1)
|
|
|
|
if len(parts) > 1:
|
|
|
|
error = parts[1]
|
|
|
|
raise qubes.exc.QubesException(
|
|
|
|
'Data import failed: {}'.format(error))
|
2017-06-02 20:34:53 +02:00
|
|
|
|
|
|
|
@qubes.api.method('internal.SuspendPre', no_payload=True)
|
|
|
|
@asyncio.coroutine
|
|
|
|
def suspend_pre(self):
|
|
|
|
'''
|
|
|
|
Method called before host system goes to sleep.
|
|
|
|
|
|
|
|
:return:
|
|
|
|
'''
|
|
|
|
|
|
|
|
# first notify all VMs
|
|
|
|
processes = []
|
|
|
|
for vm in self.app.domains:
|
|
|
|
if isinstance(vm, qubes.vm.adminvm.AdminVM):
|
|
|
|
continue
|
2019-02-24 16:08:49 +01:00
|
|
|
if not vm.is_running():
|
|
|
|
continue
|
|
|
|
if not vm.features.check_with_template('qrexec', False):
|
|
|
|
continue
|
|
|
|
try:
|
2017-06-02 20:34:53 +02:00
|
|
|
proc = yield from vm.run_service(
|
|
|
|
'qubes.SuspendPreAll', user='root',
|
|
|
|
stdin=subprocess.DEVNULL,
|
|
|
|
stdout=subprocess.DEVNULL,
|
|
|
|
stderr=subprocess.DEVNULL)
|
|
|
|
processes.append(proc)
|
2019-02-24 16:08:49 +01:00
|
|
|
except qubes.exc.QubesException as e:
|
|
|
|
vm.log.warning('Failed to run qubes.SuspendPreAll: %s', str(e))
|
2017-06-02 20:34:53 +02:00
|
|
|
|
|
|
|
# FIXME: some timeout?
|
|
|
|
if processes:
|
|
|
|
yield from asyncio.wait([p.wait() for p in processes])
|
|
|
|
|
|
|
|
coros = []
|
|
|
|
# then suspend/pause VMs
|
|
|
|
for vm in self.app.domains:
|
|
|
|
if isinstance(vm, qubes.vm.adminvm.AdminVM):
|
|
|
|
continue
|
|
|
|
if vm.is_running():
|
|
|
|
coros.append(vm.suspend())
|
|
|
|
if coros:
|
|
|
|
yield from asyncio.wait(coros)
|
|
|
|
|
|
|
|
@qubes.api.method('internal.SuspendPost', no_payload=True)
|
|
|
|
@asyncio.coroutine
|
|
|
|
def suspend_post(self):
|
|
|
|
'''
|
|
|
|
Method called after host system wake up from sleep.
|
|
|
|
|
|
|
|
:return:
|
|
|
|
'''
|
|
|
|
|
|
|
|
coros = []
|
|
|
|
# first resume/unpause VMs
|
|
|
|
for vm in self.app.domains:
|
|
|
|
if isinstance(vm, qubes.vm.adminvm.AdminVM):
|
|
|
|
continue
|
|
|
|
if vm.get_power_state() in ["Paused", "Suspended"]:
|
|
|
|
coros.append(vm.resume())
|
|
|
|
if coros:
|
|
|
|
yield from asyncio.wait(coros)
|
|
|
|
|
|
|
|
# then notify all VMs
|
|
|
|
processes = []
|
|
|
|
for vm in self.app.domains:
|
|
|
|
if isinstance(vm, qubes.vm.adminvm.AdminVM):
|
|
|
|
continue
|
2019-02-24 16:08:49 +01:00
|
|
|
if not vm.is_running():
|
|
|
|
continue
|
|
|
|
if not vm.features.check_with_template('qrexec', False):
|
|
|
|
continue
|
|
|
|
try:
|
2017-06-02 20:34:53 +02:00
|
|
|
proc = yield from vm.run_service(
|
|
|
|
'qubes.SuspendPostAll', user='root',
|
|
|
|
stdin=subprocess.DEVNULL,
|
|
|
|
stdout=subprocess.DEVNULL,
|
|
|
|
stderr=subprocess.DEVNULL)
|
|
|
|
processes.append(proc)
|
2019-02-24 16:08:49 +01:00
|
|
|
except qubes.exc.QubesException as e:
|
|
|
|
vm.log.warning('Failed to run qubes.SuspendPostAll: %s', str(e))
|
2017-06-02 20:34:53 +02:00
|
|
|
|
|
|
|
# FIXME: some timeout?
|
|
|
|
if processes:
|
|
|
|
yield from asyncio.wait([p.wait() for p in processes])
|