# -*- encoding: utf-8 -*- # # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2017 Marek Marczykowski-Górecki # # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, see . '''Extension responsible for qvm-service framework''' import qubes.ext class ServicesExtension(qubes.ext.Extension): '''This extension export features with 'service.' prefix to QubesDB in /qubes-service/ tree. ''' # pylint: disable=no-self-use @qubes.ext.handler('domain-qdb-create') def on_domain_qdb_create(self, vm, event): '''Actually export features''' # pylint: disable=unused-argument for feature, value in vm.features.items(): if not feature.startswith('service.'): continue service = feature[len('service.'):] # forcefully convert to '0' or '1' vm.untrusted_qdb.write('/qubes-service/{}'.format(service), str(int(bool(value)))) @qubes.ext.handler('domain-feature-set:*') def on_domain_feature_set(self, vm, event, feature, value, oldvalue=None): '''Update /qubes-service/ QubesDB tree in runtime''' # pylint: disable=unused-argument if not vm.is_running(): return if not feature.startswith('service.'): return service = feature[len('service.'):] # forcefully convert to '0' or '1' vm.untrusted_qdb.write('/qubes-service/{}'.format(service), str(int(bool(value)))) @qubes.ext.handler('domain-feature-delete:*') def on_domain_feature_delete(self, vm, event, feature): '''Update /qubes-service/ QubesDB tree in runtime''' # pylint: disable=unused-argument if not vm.is_running(): return if not feature.startswith('service.'): return service = feature[len('service.'):] vm.untrusted_qdb.rm('/qubes-service/{}'.format(service)) @qubes.ext.handler('features-request') def supported_services(self, vm, event, untrusted_features): '''Handle advertisement of supported services''' # pylint: disable=no-self-use,unused-argument if getattr(vm, 'template', None): vm.log.warning( 'Ignoring qubes.FeaturesRequest from template-based VM') return new_supported_services = set() for requested_service in untrusted_features: if not requested_service.startswith('supported-service.'): continue if untrusted_features[requested_service] == '1': # only allow to advertise service as supported, lack of entry # means service is not supported new_supported_services.add(requested_service) del untrusted_features # if no service is supported, ignore the whole thing - do not clear # all services in case of empty request (manual or such) if not new_supported_services: return old_supported_services = set( feat for feat in vm.features if feat.startswith('supported-service.') and vm.features[feat]) for feature in new_supported_services.difference( old_supported_services): vm.features[feature] = True for feature in old_supported_services.difference( new_supported_services): del vm.features[feature]