# pylint: disable=C,R # # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov # Copyright (C) 2016 Marek Marczykowski-Górecki # # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License along # with this program; if not, write to the Free Software Foundation, Inc., # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. '''Qubes volume and block device managment''' from __future__ import print_function import argparse import os import sys import qubes import qubes.devices import qubes.exc import qubes.tools def prepare_table(dev_list): ''' Converts a list of :py:class:`qubes.devices.DeviceInfo` objects to a list of tupples for the :py:func:`qubes.tools.print_table`. If :program:`qvm-devices` is running in a TTY, it will ommit duplicate data. :param list dev_list: List of :py:class:`qubes.devices.DeviceInfo` objects. :returns: list of tupples ''' output = [] header = [] if sys.stdout.isatty(): header += [('BACKEND:DEVID', 'DESCRIPTION', 'USED BY')] # NOQA for dev in dev_list: output += [( "{!s}:{!s}".format(dev.backend_domain, dev.ident), dev.description, str(dev.frontend_domain) if dev.frontend_domain else "", )] return header + sorted(output) def list_devices(args): ''' Called by the parser to execute the qubes-devices list subcommand. ''' app = args.app result = [] if hasattr(args, 'domains') and args.domains: for domain in args.domains: result.extend(domain.devices[args.devclass].attached()) else: for backend in app.domains: result.extend(backend.devices[args.devclass]) qubes.tools.print_table(prepare_table(result)) def attach_device(args): ''' Called by the parser to execute the :program:`qvm-devices attach` subcommand. ''' device = args.device vm = args.domains[0] vm.devices[args.devclass].attach(device) def detach_device(args): ''' Called by the parser to execute the :program:`qvm-devices detach` subcommand. ''' device = args.device vm = args.domains[0] vm.devices[args.devclass].detach(device) def init_list_parser(sub_parsers): ''' Configures the parser for the :program:`qvm-devices list` subcommand ''' # pylint: disable=protected-access list_parser = sub_parsers.add_parser('list', aliases=('ls', 'l'), help='list devices') vm_name_group = qubes.tools.VmNameGroup( list_parser, required=False, vm_action=qubes.tools.VmNameAction, help='list devices assigned to specific domain(s)') list_parser._mutually_exclusive_groups.append(vm_name_group) list_parser.set_defaults(func=list_devices) class DeviceAction(qubes.tools.QubesAction): ''' Action for argument parser that gets the :py:class:``qubes.storage.Volume`` from a POOL_NAME:VOLUME_ID string. ''' # pylint: disable=too-few-public-methods def __init__(self, help='A domain & device id combination', required=True, allow_unknown=False, **kwargs): # pylint: disable=redefined-builtin super(DeviceAction, self).__init__(help=help, required=required, **kwargs) self.allow_unknown = allow_unknown def __call__(self, parser, namespace, values, option_string=None): ''' Set ``namespace.device`` to ``values`` ''' setattr(namespace, self.dest, values) def parse_qubes_app(self, parser, namespace): ''' Acquire the :py:class:``qubes.devices.DeviceInfo`` object from ``namespace.app``. ''' assert hasattr(namespace, 'app') assert hasattr(namespace, 'devclass') app = namespace.app devclass = namespace.devclass try: backend_name, devid = getattr(namespace, self.dest).split(':', 1) try: backend = app.domains[backend_name] dev = backend.devices[devclass][devid] if not self.allow_unknown and isinstance(dev, qubes.devices.UnknownDevice): parser.error_runtime('no device {!r} in qube {!r}'.format( backend_name, devid)) except KeyError: parser.error_runtime('no domain {!r}'.format(backend_name)) except ValueError: parser.error('expected a domain & device id combination like ' 'foo:bar') def get_parser(device_class=None): '''Create :py:class:`argparse.ArgumentParser` suitable for :program:`qvm-block`. ''' parser = qubes.tools.QubesArgumentParser(description=__doc__, want_app=True) parser.register('action', 'parsers', qubes.tools.AliasedSubParsersAction) if device_class: parser.add_argument('devclass', const=device_class, action='store_const', help=argparse.SUPPRESS) else: parser.add_argument('devclass', metavar='DEVICE_CLASS', action='store', help="Device class to manage ('pci', 'usb', etc)") sub_parsers = parser.add_subparsers( title='commands', description="For more information see qvm-device command -h", dest='command') init_list_parser(sub_parsers) attach_parser = sub_parsers.add_parser( 'attach', help="Attach device to domain", aliases=('at', 'a')) attach_parser.add_argument('VMNAME', action=qubes.tools.RunningVmNameAction) attach_parser.add_argument(metavar='BACKEND:DEVICE_ID', dest='device', action=qubes.tools.VolumeAction) attach_parser.set_defaults(func=detach_device) detach_parser = sub_parsers.add_parser( "detach", help="Detach device from domain", aliases=('d', 'dt')) detach_parser.add_argument('VMNAME', action=qubes.tools.RunningVmNameAction) detach_parser.add_argument(metavar='BACKEND:DEVICE_ID', dest='device', action=qubes.tools.VolumeAction) detach_parser.set_defaults(func=detach_device) return parser def main(args=None): '''Main routine of :program:`qvm-block`.''' basename = os.path.basename(sys.argv[0]) devclass = None if basename.startswith('qvm-') and basename != 'qvm-device': devclass = basename[4:] args = get_parser(devclass).parse_args(args) try: args.func(args) except qubes.exc.QubesException as e: print(str(e), file=sys.stderr) return 1 return 0 if __name__ == '__main__': sys.exit(main())