Add DomainPool

- All domain pool volumes are removable volumes
- DomainVolume uses device name as vid
This commit is contained in:
Bahtiar `kalkin-` Gadimov 2016-05-22 21:42:54 +02:00
parent e30f894df9
commit baaac858bc
No known key found for this signature in database
GPG Key ID: 96ED3C3BA19C3DEE
2 changed files with 83 additions and 0 deletions

82
qubes/storage/domain.py Normal file
View File

@ -0,0 +1,82 @@
#!/usr/bin/env python2
# -*- encoding: utf8 -*-
#
# The Qubes OS Project, http://www.qubes-os.org
#
# Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <bahtiar@gadimov.de>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
#
''' Manages block devices in a domain '''
from qubes.storage import Pool, Volume
class DomainPool(Pool):
''' This pool manages all the block devices of a domain.
The devices are queried through :py:module:`qubesdb`
'''
driver = 'domain'
def __init__(self, vm):
self.vm = vm
super(DomainPool, self).__init__(name='p_' + vm.name)
@property
def volumes(self):
''' Queries qubesdb and returns volumes for `self.vm` '''
qdb = self.vm.qdb
if not self.vm.is_running():
return []
untrusted_qubes_devices = qdb.list('/qubes-block-devices/')
# because we get each path 3 x times as
# /qubes-block-devices/foo/{desc,mode,size} we need to merge this
untrusted_devices = {}
for untrusted_device_path in untrusted_qubes_devices:
_, _, untrusted_name, untrusted_atr = untrusted_device_path.split(
'/', 4)
if untrusted_name not in untrusted_devices.keys():
untrusted_devices[untrusted_name] = {
untrusted_atr: qdb.read(untrusted_device_path)
}
else:
untrusted_devices[untrusted_name][untrusted_atr] = qdb.read(
untrusted_device_path)
return [DomainVolume(untrusted_n, self.name, **untrusted_atrs)
for untrusted_n, untrusted_atrs in untrusted_devices.items()]
def clone(self, source, target):
raise NotImplementedError
class DomainVolume(Volume):
''' A volume provided by a block device in an domain '''
def __init__(self, name, pool, desc, mode, size):
if mode == 'w':
volume_type = 'read-write'
else:
volume_type = 'read-only'
super(DomainVolume, self).__init__(desc,
pool,
volume_type,
vid=name,
size=size,
removable=True)

View File

@ -234,6 +234,7 @@ fi
%dir %{python_sitelib}/qubes/storage
%{python_sitelib}/qubes/storage/__init__.py*
%{python_sitelib}/qubes/storage/file.py*
%{python_sitelib}/qubes/storage/domain.py*
%{python_sitelib}/qubes/storage/kernels.py*
%dir %{python_sitelib}/qubes/tools