#!/usr/bin/env python # vim: fileencoding=utf-8 # # The Qubes OS Project, https://www.qubes-os.org/ # # Copyright (C) 2010-2016 Joanna Rutkowska # Copyright (C) 2013-2016 Marek Marczykowski-Górecki # # Copyright (C) 2014-2016 Wojtek Porczyk # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License along # with this program; if not, write to the Free Software Foundation, Inc., # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. # import os import subprocess import qubes.config import qubes.ext class GUI(qubes.ext.Extension): @qubes.ext.handler('domain-start', 'domain-cmd-pre-run') def start_guid(self, vm, event, preparing_dvm=False, start_guid=True, extra_guid_args=None, **kwargs): '''Launch gui daemon. GUI daemon securely displays windows from domain. ''' # pylint: disable=no-self-use,unused-argument if not start_guid or preparing_dvm \ or not os.path.exists('/var/run/shm.id'): return if not vm.features.check_with_template('gui', not vm.hvm): vm.log.debug('Not starting gui daemon, disabled by features') return if not os.getenv('DISPLAY'): vm.log.error('Not starting gui daemon, no DISPLAY set') return vm.log.info('Starting gui daemon') guid_cmd = [qubes.config.system_path['qubes_guid_path'], '-d', str(vm.xid), '-N', vm.name, '-c', vm.label.color, '-i', vm.label.icon_path, '-l', str(vm.label.index)] if extra_guid_args is not None: guid_cmd += extra_guid_args if vm.debug: guid_cmd += ['-v', '-v'] # elif not verbose: else: guid_cmd += ['-q'] if vm.hvm: guid_cmd += ['-Q', '-n'] stubdom_guid_pidfile = \ '/var/run/qubes/guid-running.{}'.format(self.get_stubdom_xid(vm)) if not vm.debug and os.path.exists(stubdom_guid_pidfile): # Terminate stubdom guid once "real" gui agent connects stubdom_guid_pid = open(stubdom_guid_pidfile, 'r').read().strip() guid_cmd += ['-K', stubdom_guid_pid] try: subprocess.check_call(guid_cmd) except subprocess.CalledProcessError: raise qubes.exc.QubesVMError(vm, 'Cannot start qubes-guid for domain {!r}'.format(vm.name)) vm.notify_monitor_layout() vm.wait_for_session() @staticmethod def get_stubdom_xid(vm): if vm.xid < 0: return -1 if vm.app.vmm.xs is None: return -1 stubdom_xid_str = vm.app.vmm.xs.read('', '/local/domain/{}/image/device-model-domid'.format(vm.xid)) if stubdom_xid_str is None or not stubdom_xid_str.isdigit(): return -1 return int(stubdom_xid_str) @staticmethod def send_gui_mode(vm): vm.run_service('qubes.SetGuiMode', input=('SEAMLESS' if vm.features.get('gui-seamless', False) else 'FULLSCREEN')) @qubes.ext.handler('domain-spawn') def on_domain_spawn(self, vm, event, start_guid=True, **kwargs): if not start_guid: return if not vm.hvm: return if not os.getenv('DISPLAY'): vm.log.error('Not starting gui daemon, no DISPLAY set') return guid_cmd = [qubes.config.system_path['qubes_guid_path'], '-d', str(self.get_stubdom_xid(vm)), '-t', str(vm.xid), '-N', vm.name, '-c', vm.label.color, '-i', vm.label.icon_path, '-l', str(vm.label.index), ] if vm.debug: guid_cmd += ['-v', '-v'] else: guid_cmd += ['-q'] try: subprocess.check_call(guid_cmd) except subprocess.CalledProcesException: raise qubes.exc.QubesVMError(vm, 'Cannot start gui daemon') @qubes.ext.handler('monitor-layout-change') def on_monitor_layout_change(self, vm, event, monitor_layout): # pylint: disable=no-self-use if vm.features.check_with_template('no-monitor-layout', False) \ or not vm.is_running(): return pipe = vm.run('QUBESRPC qubes.SetMonitorLayout dom0', passio_popen=True, wait=True) pipe.stdin.write(''.join(monitor_layout)) pipe.stdin.close() pipe.wait()