dom0/qvm-usb: first implementation of qvm-usb
This commit is contained in:
		
							parent
							
								
									c856928314
								
							
						
					
					
						commit
						fc74c6a85b
					
				| @ -398,6 +398,43 @@ def block_detach_all(vm, vm_xid = None): | |||||||
|         xl_cmd = [ '/usr/sbin/xl', 'block-detach', str(vm_xid), devid] |         xl_cmd = [ '/usr/sbin/xl', 'block-detach', str(vm_xid), devid] | ||||||
|         subprocess.check_call(xl_cmd) |         subprocess.check_call(xl_cmd) | ||||||
| 
 | 
 | ||||||
|  | ####### USB devices ###### | ||||||
|  | 
 | ||||||
|  | def usb_check_attached(backend_vm, device, backend_xid = None): | ||||||
|  |     return None | ||||||
|  | 
 | ||||||
|  | def usb_list(): | ||||||
|  |     device_re = re.compile(r"^[0-9]+-[0-9]+$") | ||||||
|  |     # FIXME: any better idea of desc_re? | ||||||
|  |     desc_re = re.compile(r"^.{1,255}$") | ||||||
|  | 
 | ||||||
|  |     devices_list = {} | ||||||
|  | 
 | ||||||
|  |     xs_trans = xs.transaction_start() | ||||||
|  |     vm_list = xs.ls('', '/local/domain') | ||||||
|  | 
 | ||||||
|  |     for xid in vm_list: | ||||||
|  |         vm_name = xs.read(xs_trans, '/local/domain/%s/name' % xid) | ||||||
|  |         vm_devices = xs.ls(xs_trans, '/local/domain/%s/qubes-usb-devices' % xid) | ||||||
|  |         if vm_devices is None: | ||||||
|  |             continue | ||||||
|  |         for device in vm_devices: | ||||||
|  |             # Sanitize device id | ||||||
|  |             if not device_re.match(device): | ||||||
|  |                 print >> sys.stderr, "Invalid device id in VM '%s'" % vm_name | ||||||
|  |                 continue | ||||||
|  |             device_desc = xs.read(xs_trans, '/local/domain/%s/qubes-usb-devices/%s/desc' % (xid, device)) | ||||||
|  |             if not desc_re.match(device_desc): | ||||||
|  |                 print >> sys.stderr, "Invalid %s device desc in VM '%s'" % (device, vm_name) | ||||||
|  |                 continue | ||||||
|  |             visible_name = "%s:%s" % (vm_name, device) | ||||||
|  |             devices_list[visible_name] = {"name": visible_name, "xid":int(xid), | ||||||
|  |                 "vm": vm_name, "device":device, | ||||||
|  |                 "desc":device_desc} | ||||||
|  | 
 | ||||||
|  |     xs.transaction_end(xs_trans) | ||||||
|  |     return devices_list | ||||||
|  | 
 | ||||||
| ####### QubesWatch ###### | ####### QubesWatch ###### | ||||||
| 
 | 
 | ||||||
| def only_in_first_list(l1, l2): | def only_in_first_list(l1, l2): | ||||||
|  | |||||||
							
								
								
									
										126
									
								
								dom0/qvm-tools/qvm-usb
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										126
									
								
								dom0/qvm-tools/qvm-usb
									
									
									
									
									
										Executable file
									
								
							| @ -0,0 +1,126 @@ | |||||||
|  | #!/usr/bin/python2 | ||||||
|  | # | ||||||
|  | # The Qubes OS Project, http://www.qubes-os.org | ||||||
|  | # | ||||||
|  | # Copyright (C) 2010  Marek Marczykowski <marmarek@invisiblethingslab.com> | ||||||
|  | # | ||||||
|  | # This program is free software; you can redistribute it and/or | ||||||
|  | # modify it under the terms of the GNU General Public License | ||||||
|  | # as published by the Free Software Foundation; either version 2 | ||||||
|  | # of the License, or (at your option) any later version. | ||||||
|  | # | ||||||
|  | # This program is distributed in the hope that it will be useful, | ||||||
|  | # but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||||
|  | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||||
|  | # GNU General Public License for more details. | ||||||
|  | # | ||||||
|  | # You should have received a copy of the GNU General Public License | ||||||
|  | # along with this program; if not, write to the Free Software | ||||||
|  | # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA. | ||||||
|  | # | ||||||
|  | # | ||||||
|  | 
 | ||||||
|  | from qubes.qubes import QubesVmCollection, QubesException | ||||||
|  | #from qubes.qubesutils import block_list,block_attach,block_detach,block_detach_all,block_check_attached | ||||||
|  | from qubes.qubesutils import usb_list,usb_check_attached | ||||||
|  | #from qubes.qubesutils import kbytes_to_kmg, bytes_to_kmg | ||||||
|  | from optparse import OptionParser | ||||||
|  | #import subprocess | ||||||
|  | import sys | ||||||
|  | import os | ||||||
|  | 
 | ||||||
|  | def main(): | ||||||
|  |     usage = "usage: %prog -l [options]\n"\ | ||||||
|  |             "usage: %prog -a [options] <vm-name> <device-vm-name>:<device>\n"\ | ||||||
|  |             "usage: %prog -d [options] <device-vm-name>:<device>\n"\ | ||||||
|  |             "usage: %prog -d [options] <vm-name>\n"\ | ||||||
|  |             "List/set VM USB devices." | ||||||
|  | 
 | ||||||
|  |     parser = OptionParser (usage) | ||||||
|  |     parser.add_option ("-l", "--list", action="store_true", dest="do_list", default=False) | ||||||
|  |     parser.add_option ("-a", "--attach", action="store_true", dest="do_attach", default=False) | ||||||
|  |     parser.add_option ("-d", "--detach", action="store_true", dest="do_detach", default=False) | ||||||
|  | #    parser.add_option ("-f", "--frontend", dest="frontend",  | ||||||
|  | #                        help="Specify device name at destination VM [default: xvdi]") | ||||||
|  | #    parser.add_option ("--no-auto-detach", dest="auto_detach", action="store_false", default=True, | ||||||
|  | #                        help="Fail when device already connected to other VM") | ||||||
|  |     parser.add_option ("--force-root", action="store_true", dest="force_root", default=False, | ||||||
|  |                        help="Force to run, even with root privileges") | ||||||
|  | 
 | ||||||
|  |     (options, args) = parser.parse_args () | ||||||
|  | 
 | ||||||
|  |     if os.geteuid() == 0: | ||||||
|  |         if not options.force_root: | ||||||
|  |             print >> sys.stderr, "*** Running this tool as root is strongly discouraged, this will lead you in permissions problems." | ||||||
|  |             print >> sys.stderr, "Retry as unprivileged user." | ||||||
|  |             print >> sys.stderr, "... or use --force-root to continue anyway." | ||||||
|  |             exit(1) | ||||||
|  | 
 | ||||||
|  |     if options.do_list + options.do_attach + options.do_detach > 1: | ||||||
|  |         print >> sys.stderr, "Only one of -l -a -d is allowed!" | ||||||
|  |         exit (1) | ||||||
|  | 
 | ||||||
|  |     if options.do_attach or options.do_detach: | ||||||
|  |         qvm_collection = QubesVmCollection() | ||||||
|  |         qvm_collection.lock_db_for_reading() | ||||||
|  |         qvm_collection.load() | ||||||
|  |         qvm_collection.unlock_db() | ||||||
|  | 
 | ||||||
|  |     if options.do_attach: | ||||||
|  |         if (len (args) < 2): | ||||||
|  |             parser.error ("You must provide device and vm name!") | ||||||
|  |         vm = qvm_collection.get_vm_by_name(args[0]) | ||||||
|  |         if vm is None: | ||||||
|  |             parser.error ("Invalid VM name: %s" % args[0]) | ||||||
|  |         # FIXME: here we assume that device is always in form "domain:dev", which can be changed in the future | ||||||
|  |         if args[1].find(":") < 0: | ||||||
|  |             parser.error ("Invalid device syntax" % args[1]) | ||||||
|  |         dev_list = block_list() | ||||||
|  |         if not args[1] in dev_list.keys(): | ||||||
|  |             parser.error ("Invalid device name: %s" % args[1]) | ||||||
|  |         dev = dev_list[args[1]] | ||||||
|  |         backend_vm = qvm_collection.get_vm_by_name(dev['vm']) | ||||||
|  |         assert backend_vm is not None | ||||||
|  |         kwargs = {} | ||||||
|  |         if options.frontend: | ||||||
|  |             kwargs['frontend'] = options.frontend | ||||||
|  |         kwargs['auto_detach'] = options.auto_detach | ||||||
|  |         try: | ||||||
|  |             usb_attach(vm, backend_vm, dev['device'], **kwargs) | ||||||
|  |         except QubesException as e: | ||||||
|  |             print >> sys.stderr, "ERROR: %s" % str(e) | ||||||
|  |             sys.exit(1) | ||||||
|  |     elif options.do_detach: | ||||||
|  |         if (len (args) < 1): | ||||||
|  |             parser.error ("You must provide device or vm name!") | ||||||
|  |         # Check if provided name is VM | ||||||
|  |         vm = qvm_collection.get_vm_by_name(args[0]) | ||||||
|  |         if vm is not None: | ||||||
|  |             kwargs = {} | ||||||
|  |             if options.frontend: | ||||||
|  |                 kwargs['frontend'] = options.frontend | ||||||
|  |                 block_detach(vm, **kwargs) | ||||||
|  |             else: | ||||||
|  |                 block_detach_all(vm) | ||||||
|  |         else: | ||||||
|  |             # Maybe device? | ||||||
|  |             dev_list = block_list() | ||||||
|  |             if not args[0] in dev_list.keys(): | ||||||
|  |                 parser.error ("Invalid VM or device name: %s" % args[0]) | ||||||
|  |             dev = dev_list[args[0]] | ||||||
|  |             attached_to = usb_check_attached(None, dev['device'], backend_xid = dev['xid']) | ||||||
|  |             if attached_to is None: | ||||||
|  |                 print >> sys.stderr, "WARNING: Device not connected to any VM" | ||||||
|  |                 exit(0) | ||||||
|  |             usb_detach(None, attached_to['devid'], vm_xid=attached_to['xid']) | ||||||
|  |     else: | ||||||
|  |         # do_list | ||||||
|  |         for dev in usb_list().values(): | ||||||
|  |             attached_to = usb_check_attached(None, dev['device'], backend_xid = dev['xid']) | ||||||
|  |             attached_to_str = "" | ||||||
|  |             if attached_to: | ||||||
|  |                 attached_to_str = " (attached to '%s' as '%s')" % (attached_to['vm'], attached_to['frontend']) | ||||||
|  |             print "%s\t%s%s" % (dev['name'], dev['desc'], attached_to_str) | ||||||
|  |         exit (0) | ||||||
|  | 
 | ||||||
|  | main() | ||||||
| @ -3,12 +3,15 @@ | |||||||
| d=/home/abb/qubes-core | d=/home/abb/qubes-core | ||||||
| 
 | 
 | ||||||
| # Install | # Install | ||||||
| ln -sf $d/misc/qubes_usb.rules /etc/udev/rules.d/99-qubes_usb.rules | cp $d/misc/qubes_usb.rules /etc/udev/rules.d/99-qubes_usb.rules | ||||||
| 
 | 
 | ||||||
| for f in usb_add_change usb_remove ; do | for f in usb_add_change usb_remove ; do | ||||||
| 	ln -sf $d/misc/$f /usr/lib/qubes/$f | 	cp $d/misc/$f /usr/lib/qubes/$f | ||||||
| done | done | ||||||
| 
 | 
 | ||||||
|  | cp $d/dom0/qvm-core/qubesutils.py /usr/lib64/python2.6/site-packages/qubes/qubesutils.py | ||||||
|  | cp $d/dom0/qvm-tools/qvm-usb /usr/bin/qvm-usb | ||||||
|  | 
 | ||||||
| udevadm control --reload-rules | udevadm control --reload-rules | ||||||
| 
 | 
 | ||||||
| # Rerun | # Rerun | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 Alexandre Bezroutchko
						Alexandre Bezroutchko