internal.py 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. # -*- encoding: utf-8 -*-
  2. #
  3. # The Qubes OS Project, http://www.qubes-os.org
  4. #
  5. # Copyright (C) 2017 Marek Marczykowski-Górecki
  6. # <marmarek@invisiblethingslab.com>
  7. #
  8. # This library is free software; you can redistribute it and/or
  9. # modify it under the terms of the GNU Lesser General Public
  10. # License as published by the Free Software Foundation; either
  11. # version 2.1 of the License, or (at your option) any later version.
  12. #
  13. # This library is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  16. # Lesser General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU Lesser General Public
  19. # License along with this library; if not, see <https://www.gnu.org/licenses/>.
  20. ''' Internal interface for dom0 components to communicate with qubesd. '''
  21. import asyncio
  22. import json
  23. import subprocess
  24. import qubes.api
  25. import qubes.api.admin
  26. import qubes.vm.adminvm
  27. import qubes.vm.dispvm
  28. class QubesInternalAPI(qubes.api.AbstractQubesAPI):
  29. ''' Communication interface for dom0 components,
  30. by design the input here is trusted.'''
  31. SOCKNAME = '/var/run/qubesd.internal.sock'
  32. @qubes.api.method('internal.GetSystemInfo', no_payload=True)
  33. @asyncio.coroutine
  34. def getsysteminfo(self):
  35. self.enforce(self.dest.name == 'dom0')
  36. self.enforce(not self.arg)
  37. system_info = {'domains': {
  38. domain.name: {
  39. 'tags': list(domain.tags),
  40. 'type': domain.__class__.__name__,
  41. 'template_for_dispvms':
  42. getattr(domain, 'template_for_dispvms', False),
  43. 'default_dispvm': (domain.default_dispvm.name if
  44. getattr(domain, 'default_dispvm', None) else None),
  45. 'icon': str(domain.label.icon),
  46. 'guivm': (domain.guivm.name if getattr(domain, 'guivm', None)
  47. else None),
  48. } for domain in self.app.domains
  49. }}
  50. return json.dumps(system_info)
  51. @qubes.api.method('internal.vm.volume.ImportBegin',
  52. scope='local', write=True)
  53. @asyncio.coroutine
  54. def vm_volume_import(self, untrusted_payload):
  55. """Begin importing volume data. Payload is either size of new data
  56. in bytes, or empty. If empty, the current volume's size will be used.
  57. Returns size and path to where data should be written.
  58. Triggered by scripts in /etc/qubes-rpc:
  59. admin.vm.volume.Import, admin.vm.volume.ImportWithSize.
  60. When the script finish importing, it will trigger
  61. internal.vm.volume.ImportEnd (with either b'ok' or b'fail' as a
  62. payload) and response from that call will be actually send to the
  63. caller.
  64. """
  65. self.enforce(self.arg in self.dest.volumes.keys())
  66. if untrusted_payload:
  67. original_method = 'admin.vm.volume.ImportWithSize'
  68. else:
  69. original_method = 'admin.vm.volume.Import'
  70. self.src.fire_event(
  71. 'admin-permission:' + original_method,
  72. pre_event=True, dest=self.dest, arg=self.arg)
  73. if not self.dest.is_halted():
  74. raise qubes.exc.QubesVMNotHaltedError(self.dest)
  75. requested_size = None
  76. if untrusted_payload:
  77. try:
  78. untrusted_value = int(untrusted_payload.decode('ascii'))
  79. except (UnicodeDecodeError, ValueError):
  80. raise qubes.api.ProtocolError('Invalid value')
  81. self.enforce(untrusted_value > 0)
  82. requested_size = untrusted_value
  83. del untrusted_value
  84. del untrusted_payload
  85. path = yield from self.dest.storage.import_data(
  86. self.arg, requested_size)
  87. self.enforce(' ' not in path)
  88. if requested_size is None:
  89. size = self.dest.volumes[self.arg].size
  90. else:
  91. size = requested_size
  92. # when we know the action is allowed, inform extensions that it will
  93. # be performed
  94. self.dest.fire_event(
  95. 'domain-volume-import-begin', volume=self.arg, size=size)
  96. return '{} {}'.format(size, path)
  97. @qubes.api.method('internal.vm.volume.ImportEnd')
  98. @asyncio.coroutine
  99. def vm_volume_import_end(self, untrusted_payload):
  100. '''
  101. This is second half of admin.vm.volume.Import handling. It is called
  102. when actual import is finished. Response from this method is sent do
  103. the client (as a response for admin.vm.volume.Import call).
  104. The payload is either 'ok', or 'fail\n<error message>'.
  105. '''
  106. self.enforce(self.arg in self.dest.volumes.keys())
  107. success = untrusted_payload == b'ok'
  108. try:
  109. yield from self.dest.storage.import_data_end(self.arg,
  110. success=success)
  111. except:
  112. self.dest.fire_event('domain-volume-import-end', volume=self.arg,
  113. success=False)
  114. raise
  115. self.dest.fire_event('domain-volume-import-end', volume=self.arg,
  116. success=success)
  117. if not success:
  118. error = ''
  119. parts = untrusted_payload.decode('ascii').split('\n', 1)
  120. if len(parts) > 1:
  121. error = parts[1]
  122. raise qubes.exc.QubesException(
  123. 'Data import failed: {}'.format(error))
  124. @qubes.api.method('internal.SuspendPre', no_payload=True)
  125. @asyncio.coroutine
  126. def suspend_pre(self):
  127. '''
  128. Method called before host system goes to sleep.
  129. :return:
  130. '''
  131. # first notify all VMs
  132. processes = []
  133. for vm in self.app.domains:
  134. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  135. continue
  136. if not vm.is_running():
  137. continue
  138. if not vm.features.check_with_template('qrexec', False):
  139. continue
  140. try:
  141. proc = yield from vm.run_service(
  142. 'qubes.SuspendPreAll', user='root',
  143. stdin=subprocess.DEVNULL,
  144. stdout=subprocess.DEVNULL,
  145. stderr=subprocess.DEVNULL)
  146. processes.append(proc)
  147. except qubes.exc.QubesException as e:
  148. vm.log.warning('Failed to run qubes.SuspendPreAll: %s', str(e))
  149. # FIXME: some timeout?
  150. if processes:
  151. yield from asyncio.wait([p.wait() for p in processes])
  152. coros = []
  153. # then suspend/pause VMs
  154. for vm in self.app.domains:
  155. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  156. continue
  157. if vm.is_running():
  158. coros.append(vm.suspend())
  159. if coros:
  160. yield from asyncio.wait(coros)
  161. @qubes.api.method('internal.SuspendPost', no_payload=True)
  162. @asyncio.coroutine
  163. def suspend_post(self):
  164. '''
  165. Method called after host system wake up from sleep.
  166. :return:
  167. '''
  168. coros = []
  169. # first resume/unpause VMs
  170. for vm in self.app.domains:
  171. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  172. continue
  173. if vm.get_power_state() in ["Paused", "Suspended"]:
  174. coros.append(vm.resume())
  175. if coros:
  176. yield from asyncio.wait(coros)
  177. # then notify all VMs
  178. processes = []
  179. for vm in self.app.domains:
  180. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  181. continue
  182. if not vm.is_running():
  183. continue
  184. if not vm.features.check_with_template('qrexec', False):
  185. continue
  186. try:
  187. proc = yield from vm.run_service(
  188. 'qubes.SuspendPostAll', user='root',
  189. stdin=subprocess.DEVNULL,
  190. stdout=subprocess.DEVNULL,
  191. stderr=subprocess.DEVNULL)
  192. processes.append(proc)
  193. except qubes.exc.QubesException as e:
  194. vm.log.warning('Failed to run qubes.SuspendPostAll: %s', str(e))
  195. # FIXME: some timeout?
  196. if processes:
  197. yield from asyncio.wait([p.wait() for p in processes])