1543 lines
		
	
	
		
			55 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			1543 lines
		
	
	
		
			55 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| #
 | |
| # The Qubes OS Project, https://www.qubes-os.org/
 | |
| #
 | |
| # Copyright (C) 2017  Wojtek Porczyk <woju@invisiblethingslab.com>
 | |
| #
 | |
| # This library is free software; you can redistribute it and/or
 | |
| # modify it under the terms of the GNU Lesser General Public
 | |
| # License as published by the Free Software Foundation; either
 | |
| # version 2.1 of the License, or (at your option) any later version.
 | |
| #
 | |
| # This library is distributed in the hope that it will be useful,
 | |
| # but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
| # Lesser General Public License for more details.
 | |
| #
 | |
| # You should have received a copy of the GNU Lesser General Public
 | |
| # License along with this library; if not, see <https://www.gnu.org/licenses/>.
 | |
| #
 | |
| 
 | |
| '''
 | |
| Qubes OS Management API
 | |
| '''
 | |
| 
 | |
| import asyncio
 | |
| import functools
 | |
| import itertools
 | |
| import os
 | |
| import string
 | |
| import subprocess
 | |
| 
 | |
| import libvirt
 | |
| import pkg_resources
 | |
| import yaml
 | |
| 
 | |
| import qubes.api
 | |
| import qubes.backup
 | |
| import qubes.config
 | |
| import qubes.devices
 | |
| import qubes.firewall
 | |
| import qubes.storage
 | |
| import qubes.utils
 | |
| import qubes.vm
 | |
| import qubes.vm.adminvm
 | |
| import qubes.vm.qubesvm
 | |
| 
 | |
| 
 | |
| class QubesMgmtEventsDispatcher(object):
 | |
|     def __init__(self, filters, send_event):
 | |
|         self.filters = filters
 | |
|         self.send_event = send_event
 | |
| 
 | |
|     def vm_handler(self, subject, event, **kwargs):
 | |
|         # do not send internal events
 | |
|         if event.startswith('admin-permission:'):
 | |
|             return
 | |
|         if event.startswith('device-get:'):
 | |
|             return
 | |
|         if event.startswith('device-list:'):
 | |
|             return
 | |
|         if event.startswith('device-list-attached:'):
 | |
|             return
 | |
|         if event in ('domain-is-fully-usable',):
 | |
|             return
 | |
| 
 | |
|         if not list(qubes.api.apply_filters([(subject, event, kwargs)],
 | |
|                 self.filters)):
 | |
|             return
 | |
|         self.send_event(subject, event, **kwargs)
 | |
| 
 | |
|     def app_handler(self, subject, event, **kwargs):
 | |
|         if not list(qubes.api.apply_filters([(subject, event, kwargs)],
 | |
|                 self.filters)):
 | |
|             return
 | |
|         self.send_event(subject, event, **kwargs)
 | |
| 
 | |
|     def on_domain_add(self, subject, event, vm):
 | |
|         # pylint: disable=unused-argument
 | |
|         vm.add_handler('*', self.vm_handler)
 | |
| 
 | |
|     def on_domain_delete(self, subject, event, vm):
 | |
|         # pylint: disable=unused-argument
 | |
|         vm.remove_handler('*', self.vm_handler)
 | |
| 
 | |
| 
 | |
| class QubesAdminAPI(qubes.api.AbstractQubesAPI):
 | |
|     '''Implementation of Qubes Management API calls
 | |
| 
 | |
|     This class contains all the methods available in the main API.
 | |
| 
 | |
|     .. seealso::
 | |
|         https://www.qubes-os.org/doc/mgmt1/
 | |
|     '''
 | |
| 
 | |
|     SOCKNAME = '/var/run/qubesd.sock'
 | |
| 
 | |
|     @qubes.api.method('admin.vmclass.List', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vmclass_list(self):
 | |
|         '''List all VM classes'''
 | |
|         assert not self.arg
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         entrypoints = self.fire_event_for_filter(
 | |
|             pkg_resources.iter_entry_points(qubes.vm.VM_ENTRY_POINT))
 | |
| 
 | |
|         return ''.join('{}\n'.format(ep.name)
 | |
|             for ep in entrypoints)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.List', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_list(self):
 | |
|         '''List all the domains'''
 | |
|         assert not self.arg
 | |
| 
 | |
|         if self.dest.name == 'dom0':
 | |
|             domains = self.fire_event_for_filter(self.app.domains)
 | |
|         else:
 | |
|             domains = self.fire_event_for_filter([self.dest])
 | |
| 
 | |
|         return ''.join('{} class={} state={}\n'.format(
 | |
|                 vm.name,
 | |
|                 vm.__class__.__name__,
 | |
|                 vm.get_power_state())
 | |
|             for vm in sorted(domains))
 | |
| 
 | |
|     @qubes.api.method('admin.vm.property.List', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_property_list(self):
 | |
|         '''List all properties on a qube'''
 | |
|         return self._property_list(self.dest)
 | |
| 
 | |
|     @qubes.api.method('admin.property.List', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def property_list(self):
 | |
|         '''List all global properties'''
 | |
|         assert self.dest.name == 'dom0'
 | |
|         return self._property_list(self.app)
 | |
| 
 | |
|     def _property_list(self, dest):
 | |
|         assert not self.arg
 | |
| 
 | |
|         properties = self.fire_event_for_filter(dest.property_list())
 | |
| 
 | |
|         return ''.join('{}\n'.format(prop.__name__) for prop in properties)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.property.Get', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_property_get(self):
 | |
|         '''Get a value of one property'''
 | |
|         return self._property_get(self.dest)
 | |
| 
 | |
|     @qubes.api.method('admin.property.Get', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def property_get(self):
 | |
|         '''Get a value of one global property'''
 | |
|         assert self.dest.name == 'dom0'
 | |
|         return self._property_get(self.app)
 | |
| 
 | |
|     def _property_get(self, dest):
 | |
|         if self.arg not in dest.property_list():
 | |
|             raise qubes.exc.QubesNoSuchPropertyError(dest, self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         property_def = dest.property_get_def(self.arg)
 | |
|         # explicit list to be sure that it matches protocol spec
 | |
|         if isinstance(property_def, qubes.vm.VMProperty):
 | |
|             property_type = 'vm'
 | |
|         elif property_def.type is int:
 | |
|             property_type = 'int'
 | |
|         elif property_def.type is bool:
 | |
|             property_type = 'bool'
 | |
|         elif self.arg == 'label':
 | |
|             property_type = 'label'
 | |
|         else:
 | |
|             property_type = 'str'
 | |
| 
 | |
|         try:
 | |
|             value = getattr(dest, self.arg)
 | |
|         except AttributeError:
 | |
|             return 'default=True type={} '.format(property_type)
 | |
|         else:
 | |
|             return 'default={} type={} {}'.format(
 | |
|                 str(dest.property_is_default(self.arg)),
 | |
|                 property_type,
 | |
|                 str(value) if value is not None else '')
 | |
| 
 | |
|     @qubes.api.method('admin.vm.property.GetDefault', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_property_get_default(self):
 | |
|         '''Get a value of one property'''
 | |
|         return self._property_get_default(self.dest)
 | |
| 
 | |
|     @qubes.api.method('admin.property.GetDefault', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def property_get_default(self):
 | |
|         '''Get a value of one global property'''
 | |
|         assert self.dest.name == 'dom0'
 | |
|         return self._property_get_default(self.app)
 | |
| 
 | |
|     def _property_get_default(self, dest):
 | |
|         if self.arg not in dest.property_list():
 | |
|             raise qubes.exc.QubesNoSuchPropertyError(dest, self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         property_def = dest.property_get_def(self.arg)
 | |
|         # explicit list to be sure that it matches protocol spec
 | |
|         if isinstance(property_def, qubes.vm.VMProperty):
 | |
|             property_type = 'vm'
 | |
|         elif property_def.type is int:
 | |
|             property_type = 'int'
 | |
|         elif property_def.type is bool:
 | |
|             property_type = 'bool'
 | |
|         elif self.arg == 'label':
 | |
|             property_type = 'label'
 | |
|         else:
 | |
|             property_type = 'str'
 | |
| 
 | |
|         try:
 | |
|             value = property_def.get_default(dest)
 | |
|         except AttributeError:
 | |
|             return None
 | |
|         else:
 | |
|             return 'type={} {}'.format(
 | |
|                 property_type,
 | |
|                 str(value) if value is not None else '')
 | |
| 
 | |
|     @qubes.api.method('admin.vm.property.Set',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_property_set(self, untrusted_payload):
 | |
|         '''Set property value'''
 | |
|         return self._property_set(self.dest,
 | |
|             untrusted_payload=untrusted_payload)
 | |
| 
 | |
|     @qubes.api.method('admin.property.Set',
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def property_set(self, untrusted_payload):
 | |
|         '''Set property value'''
 | |
|         assert self.dest.name == 'dom0'
 | |
|         return self._property_set(self.app,
 | |
|             untrusted_payload=untrusted_payload)
 | |
| 
 | |
|     def _property_set(self, dest, untrusted_payload):
 | |
|         if self.arg not in dest.property_list():
 | |
|             raise qubes.exc.QubesNoSuchPropertyError(dest, self.arg)
 | |
| 
 | |
|         property_def = dest.property_get_def(self.arg)
 | |
|         newvalue = property_def.sanitize(untrusted_newvalue=untrusted_payload)
 | |
| 
 | |
|         self.fire_event_for_permission(newvalue=newvalue)
 | |
| 
 | |
|         setattr(dest, self.arg, newvalue)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.property.Help', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_property_help(self):
 | |
|         '''Get help for one property'''
 | |
|         return self._property_help(self.dest)
 | |
| 
 | |
|     @qubes.api.method('admin.property.Help', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def property_help(self):
 | |
|         '''Get help for one property'''
 | |
|         assert self.dest.name == 'dom0'
 | |
|         return self._property_help(self.app)
 | |
| 
 | |
|     def _property_help(self, dest):
 | |
|         if self.arg not in dest.property_list():
 | |
|             raise qubes.exc.QubesNoSuchPropertyError(dest, self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         try:
 | |
|             doc = dest.property_get_def(self.arg).__doc__
 | |
|         except AttributeError:
 | |
|             return ''
 | |
| 
 | |
|         return qubes.utils.format_doc(doc)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.property.Reset', no_payload=True,
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_property_reset(self):
 | |
|         '''Reset a property to a default value'''
 | |
|         return self._property_reset(self.dest)
 | |
| 
 | |
|     @qubes.api.method('admin.property.Reset', no_payload=True,
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def property_reset(self):
 | |
|         '''Reset a property to a default value'''
 | |
|         assert self.dest.name == 'dom0'
 | |
|         return self._property_reset(self.app)
 | |
| 
 | |
|     def _property_reset(self, dest):
 | |
|         if self.arg not in dest.property_list():
 | |
|             raise qubes.exc.QubesNoSuchPropertyError(dest, self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         delattr(dest, self.arg)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.List', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_list(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         volume_names = self.fire_event_for_filter(self.dest.volumes.keys())
 | |
|         return ''.join('{}\n'.format(name) for name in volume_names)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.Info', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_info(self):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         volume = self.dest.volumes[self.arg]
 | |
|         # properties defined in API
 | |
|         volume_properties = [
 | |
|             'pool', 'vid', 'size', 'usage', 'rw', 'source',
 | |
|             'save_on_stop', 'snap_on_start', 'revisions_to_keep', 'is_outdated']
 | |
| 
 | |
|         def _serialize(value):
 | |
|             if callable(value):
 | |
|                 value = value()
 | |
|             if value is None:
 | |
|                 value = ''
 | |
|             return str(value)
 | |
|         return ''.join('{}={}\n'.format(key, _serialize(getattr(volume, key)))
 | |
|             for key in volume_properties)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.ListSnapshots', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_listsnapshots(self):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
| 
 | |
|         volume = self.dest.volumes[self.arg]
 | |
|         id_to_timestamp = volume.revisions
 | |
|         revisions = sorted(id_to_timestamp, key=id_to_timestamp.__getitem__)
 | |
|         revisions = self.fire_event_for_filter(revisions)
 | |
| 
 | |
|         return ''.join('{}\n'.format(revision) for revision in revisions)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.Revert',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_revert(self, untrusted_payload):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
|         untrusted_revision = untrusted_payload.decode('ascii').strip()
 | |
|         del untrusted_payload
 | |
| 
 | |
|         volume = self.dest.volumes[self.arg]
 | |
|         snapshots = volume.revisions
 | |
|         assert untrusted_revision in snapshots
 | |
|         revision = untrusted_revision
 | |
| 
 | |
|         self.fire_event_for_permission(volume=volume, revision=revision)
 | |
| 
 | |
|         ret = volume.revert(revision)
 | |
|         if asyncio.iscoroutine(ret):
 | |
|             yield from ret
 | |
|         self.app.save()
 | |
| 
 | |
|     # write=True because this allow to clone VM - and most likely modify that
 | |
|     # one - still having the same data
 | |
|     @qubes.api.method('admin.vm.volume.CloneFrom', no_payload=True,
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_clone_from(self):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
| 
 | |
|         volume = self.dest.volumes[self.arg]
 | |
| 
 | |
|         self.fire_event_for_permission(volume=volume)
 | |
| 
 | |
|         token = qubes.utils.random_string(32)
 | |
|         # save token on self.app, as self is not persistent
 | |
|         if not hasattr(self.app, 'api_admin_pending_clone'):
 | |
|             self.app.api_admin_pending_clone = {}
 | |
|         # don't handle collisions any better - if someone is so much out of
 | |
|         # luck, can try again anyway
 | |
|         assert token not in self.app.api_admin_pending_clone
 | |
| 
 | |
|         self.app.api_admin_pending_clone[token] = volume
 | |
|         return token
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.CloneTo',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_clone_to(self, untrusted_payload):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
|         untrusted_token = untrusted_payload.decode('ascii').strip()
 | |
|         del untrusted_payload
 | |
|         assert untrusted_token in getattr(self.app,
 | |
|             'api_admin_pending_clone', {})
 | |
|         token = untrusted_token
 | |
|         del untrusted_token
 | |
| 
 | |
|         src_volume = self.app.api_admin_pending_clone[token]
 | |
|         del self.app.api_admin_pending_clone[token]
 | |
| 
 | |
|         # make sure the volume still exists, but invalidate token anyway
 | |
|         assert str(src_volume.pool) in self.app.pools
 | |
|         assert src_volume in self.app.pools[str(src_volume.pool)].volumes
 | |
| 
 | |
|         dst_volume = self.dest.volumes[self.arg]
 | |
| 
 | |
|         self.fire_event_for_permission(src_volume=src_volume,
 | |
|             dst_volume=dst_volume)
 | |
| 
 | |
|         op_retval = dst_volume.import_volume(src_volume)
 | |
| 
 | |
|         # clone/import functions may be either synchronous or asynchronous
 | |
|         # in the later case, we need to wait for them to finish
 | |
|         if asyncio.iscoroutine(op_retval):
 | |
|             op_retval = yield from op_retval
 | |
| 
 | |
|         self.dest.volumes[self.arg] = op_retval
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.Resize',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_resize(self, untrusted_payload):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
|         untrusted_size = untrusted_payload.decode('ascii').strip()
 | |
|         del untrusted_payload
 | |
|         assert untrusted_size.isdigit()  # only digits, forbid '-' too
 | |
|         assert len(untrusted_size) <= 20  # limit to about 2^64
 | |
| 
 | |
|         size = int(untrusted_size)
 | |
| 
 | |
|         self.fire_event_for_permission(size=size)
 | |
| 
 | |
|         yield from self.dest.storage.resize(self.arg, size)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.Import', no_payload=True,
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_import(self):
 | |
|         '''Import volume data.
 | |
| 
 | |
|         Note that this function only returns a path to where data should be
 | |
|         written, actual importing is done by a script in /etc/qubes-rpc
 | |
|         When the script finish importing, it will trigger
 | |
|         internal.vm.volume.ImportEnd (with either b'ok' or b'fail' as a
 | |
|         payload) and response from that call will be actually send to the
 | |
|         caller.
 | |
|         '''
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         if not self.dest.is_halted():
 | |
|             raise qubes.exc.QubesVMNotHaltedError(self.dest)
 | |
| 
 | |
|         path = self.dest.storage.import_data(self.arg)
 | |
|         assert ' ' not in path
 | |
|         size = self.dest.volumes[self.arg].size
 | |
| 
 | |
|         # when we know the action is allowed, inform extensions that it will
 | |
|         # be performed
 | |
|         self.dest.fire_event('domain-volume-import-begin', volume=self.arg)
 | |
| 
 | |
|         return '{} {}'.format(size, path)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.Set.revisions_to_keep',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_set_revisions_to_keep(self, untrusted_payload):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
|         try:
 | |
|             untrusted_value = int(untrusted_payload.decode('ascii'))
 | |
|         except (UnicodeDecodeError, ValueError):
 | |
|             raise qubes.api.ProtocolError('Invalid value')
 | |
|         del untrusted_payload
 | |
|         assert untrusted_value >= 0
 | |
|         newvalue = untrusted_value
 | |
|         del untrusted_value
 | |
| 
 | |
|         self.fire_event_for_permission(newvalue=newvalue)
 | |
| 
 | |
|         self.dest.volumes[self.arg].revisions_to_keep = newvalue
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.volume.Set.rw',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_volume_set_rw(self, untrusted_payload):
 | |
|         assert self.arg in self.dest.volumes.keys()
 | |
|         try:
 | |
|             newvalue = qubes.property.bool(None, None,
 | |
|                 untrusted_payload.decode('ascii'))
 | |
|         except (UnicodeDecodeError, ValueError):
 | |
|             raise qubes.api.ProtocolError('Invalid value')
 | |
|         del untrusted_payload
 | |
| 
 | |
|         self.fire_event_for_permission(newvalue=newvalue)
 | |
| 
 | |
|         if not self.dest.is_halted():
 | |
|             raise qubes.exc.QubesVMNotHaltedError(self.dest)
 | |
| 
 | |
|         self.dest.volumes[self.arg].rw = newvalue
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.tag.List', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_tag_list(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         tags = self.dest.tags
 | |
| 
 | |
|         tags = self.fire_event_for_filter(tags)
 | |
| 
 | |
|         return ''.join('{}\n'.format(tag) for tag in sorted(tags))
 | |
| 
 | |
|     @qubes.api.method('admin.vm.tag.Get', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_tag_get(self):
 | |
|         qubes.vm.Tags.validate_tag(self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         return '1' if self.arg in self.dest.tags else '0'
 | |
| 
 | |
|     @qubes.api.method('admin.vm.tag.Set', no_payload=True,
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_tag_set(self):
 | |
|         qubes.vm.Tags.validate_tag(self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         self.dest.tags.add(self.arg)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.tag.Remove', no_payload=True,
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_tag_remove(self):
 | |
|         qubes.vm.Tags.validate_tag(self.arg)
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         try:
 | |
|             self.dest.tags.remove(self.arg)
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesTagNotFoundError(self.dest, self.arg)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.pool.List', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def pool_list(self):
 | |
|         assert not self.arg
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         pools = self.fire_event_for_filter(self.app.pools)
 | |
| 
 | |
|         return ''.join('{}\n'.format(pool) for pool in pools)
 | |
| 
 | |
|     @qubes.api.method('admin.pool.ListDrivers', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def pool_listdrivers(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert not self.arg
 | |
| 
 | |
|         drivers = self.fire_event_for_filter(qubes.storage.pool_drivers())
 | |
| 
 | |
|         return ''.join('{} {}\n'.format(
 | |
|             driver,
 | |
|             ' '.join(qubes.storage.driver_parameters(driver)))
 | |
|             for driver in drivers)
 | |
| 
 | |
|     @qubes.api.method('admin.pool.Info', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def pool_info(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert self.arg in self.app.pools.keys()
 | |
| 
 | |
|         pool = self.app.pools[self.arg]
 | |
| 
 | |
|         self.fire_event_for_permission(pool=pool)
 | |
| 
 | |
|         size_info = ''
 | |
|         try:
 | |
|             size_info += 'size={}\n'.format(pool.size)
 | |
|         except NotImplementedError:
 | |
|             pass
 | |
|         try:
 | |
|             size_info += 'usage={}\n'.format(pool.usage)
 | |
|         except NotImplementedError:
 | |
|             pass
 | |
| 
 | |
|         return ''.join('{}={}\n'.format(prop, val)
 | |
|             for prop, val in sorted(pool.config.items())) + \
 | |
|             size_info
 | |
| 
 | |
|     @qubes.api.method('admin.pool.Add',
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def pool_add(self, untrusted_payload):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         drivers = qubes.storage.pool_drivers()
 | |
|         assert self.arg in drivers
 | |
|         untrusted_pool_config = untrusted_payload.decode('ascii').splitlines()
 | |
|         del untrusted_payload
 | |
|         assert all(('=' in line) for line in untrusted_pool_config)
 | |
|         # pairs of (option, value)
 | |
|         untrusted_pool_config = [line.split('=', 1)
 | |
|             for line in untrusted_pool_config]
 | |
|         # reject duplicated options
 | |
|         assert len(set(x[0] for x in untrusted_pool_config)) == \
 | |
|                len([x[0] for x in untrusted_pool_config])
 | |
|         # and convert to dict
 | |
|         untrusted_pool_config = dict(untrusted_pool_config)
 | |
| 
 | |
|         assert 'name' in untrusted_pool_config
 | |
|         untrusted_pool_name = untrusted_pool_config.pop('name')
 | |
|         allowed_chars = string.ascii_letters + string.digits + '-_.'
 | |
|         assert all(c in allowed_chars for c in untrusted_pool_name)
 | |
|         pool_name = untrusted_pool_name
 | |
|         assert pool_name not in self.app.pools
 | |
| 
 | |
|         driver_parameters = qubes.storage.driver_parameters(self.arg)
 | |
|         assert all(key in driver_parameters for key in untrusted_pool_config)
 | |
|         pool_config = untrusted_pool_config
 | |
| 
 | |
|         self.fire_event_for_permission(name=pool_name,
 | |
|             pool_config=pool_config)
 | |
| 
 | |
|         self.app.add_pool(name=pool_name, driver=self.arg, **pool_config)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.pool.Remove', no_payload=True,
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def pool_remove(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert self.arg in self.app.pools.keys()
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         self.app.remove_pool(self.arg)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.pool.Set.revisions_to_keep',
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def pool_set_revisions_to_keep(self, untrusted_payload):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert self.arg in self.app.pools.keys()
 | |
|         pool = self.app.pools[self.arg]
 | |
|         try:
 | |
|             untrusted_value = int(untrusted_payload.decode('ascii'))
 | |
|         except (UnicodeDecodeError, ValueError):
 | |
|             raise qubes.api.ProtocolError('Invalid value')
 | |
|         del untrusted_payload
 | |
|         assert untrusted_value >= 0
 | |
|         newvalue = untrusted_value
 | |
|         del untrusted_value
 | |
| 
 | |
|         self.fire_event_for_permission(newvalue=newvalue)
 | |
| 
 | |
|         pool.revisions_to_keep = newvalue
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.label.List', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def label_list(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert not self.arg
 | |
| 
 | |
|         labels = self.fire_event_for_filter(self.app.labels.values())
 | |
| 
 | |
|         return ''.join('{}\n'.format(label.name) for label in labels)
 | |
| 
 | |
|     @qubes.api.method('admin.label.Get', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def label_get(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         try:
 | |
|             label = self.app.get_label(self.arg)
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesValueError
 | |
| 
 | |
|         self.fire_event_for_permission(label=label)
 | |
| 
 | |
|         return label.color
 | |
| 
 | |
|     @qubes.api.method('admin.label.Index', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def label_index(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         try:
 | |
|             label = self.app.get_label(self.arg)
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesValueError
 | |
| 
 | |
|         self.fire_event_for_permission(label=label)
 | |
| 
 | |
|         return str(label.index)
 | |
| 
 | |
|     @qubes.api.method('admin.label.Create',
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def label_create(self, untrusted_payload):
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         # don't confuse label name with label index
 | |
|         assert not self.arg.isdigit()
 | |
|         allowed_chars = string.ascii_letters + string.digits + '-_.'
 | |
|         assert all(c in allowed_chars for c in self.arg)
 | |
|         try:
 | |
|             self.app.get_label(self.arg)
 | |
|         except KeyError:
 | |
|             # ok, no such label yet
 | |
|             pass
 | |
|         else:
 | |
|             raise qubes.exc.QubesValueError('label already exists')
 | |
| 
 | |
|         untrusted_payload = untrusted_payload.decode('ascii').strip()
 | |
|         assert len(untrusted_payload) == 8
 | |
|         assert untrusted_payload.startswith('0x')
 | |
|         # besides prefix, only hex digits are allowed
 | |
|         assert all(x in string.hexdigits for x in untrusted_payload[2:])
 | |
| 
 | |
|         # SEE: #2732
 | |
|         color = untrusted_payload
 | |
| 
 | |
|         self.fire_event_for_permission(color=color)
 | |
| 
 | |
|         # allocate new index, but make sure it's outside of default labels set
 | |
|         new_index = max(
 | |
|             qubes.config.max_default_label, *self.app.labels.keys()) + 1
 | |
| 
 | |
|         label = qubes.Label(new_index, color, self.arg)
 | |
|         self.app.labels[new_index] = label
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.label.Remove', no_payload=True,
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def label_remove(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         try:
 | |
|             label = self.app.get_label(self.arg)
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesValueError
 | |
|         # don't allow removing default labels
 | |
|         assert label.index > qubes.config.max_default_label
 | |
| 
 | |
|         # FIXME: this should be in app.add_label()
 | |
|         for vm in self.app.domains:
 | |
|             if vm.label == label:
 | |
|                 raise qubes.exc.QubesException('label still in use')
 | |
| 
 | |
|         self.fire_event_for_permission(label=label)
 | |
| 
 | |
|         del self.app.labels[label.index]
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Start', no_payload=True,
 | |
|         scope='local', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_start(self):
 | |
|         assert not self.arg
 | |
|         self.fire_event_for_permission()
 | |
|         try:
 | |
|             yield from self.dest.start()
 | |
|         except libvirt.libvirtError as e:
 | |
|             # change to QubesException, so will be reported to the user
 | |
|             raise qubes.exc.QubesException('Start failed: ' + str(e) +
 | |
|                 ', see /var/log/libvirt/libxl/libxl-driver.log for details')
 | |
| 
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Shutdown', no_payload=True,
 | |
|         scope='local', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_shutdown(self):
 | |
|         assert not self.arg
 | |
|         self.fire_event_for_permission()
 | |
|         yield from self.dest.shutdown()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Pause', no_payload=True,
 | |
|         scope='local', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_pause(self):
 | |
|         assert not self.arg
 | |
|         self.fire_event_for_permission()
 | |
|         yield from self.dest.pause()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Unpause', no_payload=True,
 | |
|         scope='local', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_unpause(self):
 | |
|         assert not self.arg
 | |
|         self.fire_event_for_permission()
 | |
|         yield from self.dest.unpause()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Kill', no_payload=True,
 | |
|         scope='local', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_kill(self):
 | |
|         assert not self.arg
 | |
|         self.fire_event_for_permission()
 | |
|         yield from self.dest.kill()
 | |
| 
 | |
|     @qubes.api.method('admin.Events', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def events(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         # run until client connection is terminated
 | |
|         self.cancellable = True
 | |
|         wait_for_cancel = asyncio.get_event_loop().create_future()
 | |
| 
 | |
|         # cache event filters, to not call an event each time an event arrives
 | |
|         event_filters = self.fire_event_for_permission()
 | |
| 
 | |
|         dispatcher = QubesMgmtEventsDispatcher(event_filters, self.send_event)
 | |
|         if self.dest.name == 'dom0':
 | |
|             self.app.add_handler('*', dispatcher.app_handler)
 | |
|             self.app.add_handler('domain-add', dispatcher.on_domain_add)
 | |
|             self.app.add_handler('domain-delete', dispatcher.on_domain_delete)
 | |
|             for vm in self.app.domains:
 | |
|                 vm.add_handler('*', dispatcher.vm_handler)
 | |
|         else:
 | |
|             self.dest.add_handler('*', dispatcher.vm_handler)
 | |
| 
 | |
|         # send artificial event as a confirmation that connection is established
 | |
|         self.send_event(self.app, 'connection-established')
 | |
| 
 | |
|         try:
 | |
|             yield from wait_for_cancel
 | |
|         except asyncio.CancelledError:
 | |
|             # the above waiting was already interrupted, this is all we need
 | |
|             pass
 | |
| 
 | |
|         if self.dest.name == 'dom0':
 | |
|             self.app.remove_handler('*', dispatcher.app_handler)
 | |
|             self.app.remove_handler('domain-add', dispatcher.on_domain_add)
 | |
|             self.app.remove_handler('domain-delete',
 | |
|                 dispatcher.on_domain_delete)
 | |
|             for vm in self.app.domains:
 | |
|                 vm.remove_handler('*', dispatcher.vm_handler)
 | |
|         else:
 | |
|             self.dest.remove_handler('*', dispatcher.vm_handler)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.feature.List', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_feature_list(self):
 | |
|         assert not self.arg
 | |
|         features = self.fire_event_for_filter(self.dest.features.keys())
 | |
|         return ''.join('{}\n'.format(feature) for feature in features)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.feature.Get', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_feature_get(self):
 | |
|         # validation of self.arg done by qrexec-policy is enough
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
|         try:
 | |
|             value = self.dest.features[self.arg]
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesFeatureNotFoundError(self.dest, self.arg)
 | |
|         return value
 | |
| 
 | |
|     @qubes.api.method('admin.vm.feature.CheckWithTemplate', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_feature_checkwithtemplate(self):
 | |
|         # validation of self.arg done by qrexec-policy is enough
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
|         try:
 | |
|             value = self.dest.features.check_with_template(self.arg)
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesFeatureNotFoundError(self.dest, self.arg)
 | |
|         return value
 | |
| 
 | |
|     @qubes.api.method('admin.vm.feature.CheckWithNetvm', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_feature_checkwithnetvm(self):
 | |
|         # validation of self.arg done by qrexec-policy is enough
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
|         try:
 | |
|             value = self.dest.features.check_with_netvm(self.arg)
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesFeatureNotFoundError(self.dest, self.arg)
 | |
|         return value
 | |
| 
 | |
|     @qubes.api.method('admin.vm.feature.Remove', no_payload=True,
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_feature_remove(self):
 | |
|         # validation of self.arg done by qrexec-policy is enough
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
|         try:
 | |
|             del self.dest.features[self.arg]
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesFeatureNotFoundError(self.dest, self.arg)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.feature.Set',
 | |
|         scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_feature_set(self, untrusted_payload):
 | |
|         # validation of self.arg done by qrexec-policy is enough
 | |
|         value = untrusted_payload.decode('ascii', errors='strict')
 | |
|         del untrusted_payload
 | |
| 
 | |
|         self.fire_event_for_permission(value=value)
 | |
|         self.dest.features[self.arg] = value
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Create.{endpoint}', endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points(qubes.vm.VM_ENTRY_POINT)),
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_create(self, endpoint, untrusted_payload=None):
 | |
|         return self._vm_create(endpoint, allow_pool=False,
 | |
|             untrusted_payload=untrusted_payload)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.CreateInPool.{endpoint}', endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points(qubes.vm.VM_ENTRY_POINT)),
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_create_in_pool(self, endpoint, untrusted_payload=None):
 | |
|         return self._vm_create(endpoint, allow_pool=True,
 | |
|             untrusted_payload=untrusted_payload)
 | |
| 
 | |
|     def _vm_create(self, vm_type, allow_pool=False, untrusted_payload=None):
 | |
|         assert self.dest.name == 'dom0'
 | |
| 
 | |
|         kwargs = {}
 | |
|         pool = None
 | |
|         pools = {}
 | |
| 
 | |
|         # this will raise exception if none is found
 | |
|         vm_class = qubes.utils.get_entry_point_one(qubes.vm.VM_ENTRY_POINT,
 | |
|             vm_type)
 | |
| 
 | |
|         # if argument is given, it needs to be a valid template, and only
 | |
|         # when given VM class do need a template
 | |
|         if hasattr(vm_class, 'template'):
 | |
|             if self.arg:
 | |
|                 assert self.arg in self.app.domains
 | |
|                 kwargs['template'] = self.app.domains[self.arg]
 | |
|         else:
 | |
|             assert not self.arg
 | |
| 
 | |
|         for untrusted_param in untrusted_payload.decode('ascii',
 | |
|                 errors='strict').split(' '):
 | |
|             untrusted_key, untrusted_value = untrusted_param.split('=', 1)
 | |
|             if untrusted_key in kwargs:
 | |
|                 raise qubes.api.ProtocolError('duplicated parameters')
 | |
| 
 | |
|             if untrusted_key == 'name':
 | |
|                 qubes.vm.validate_name(None, None, untrusted_value)
 | |
|                 kwargs['name'] = untrusted_value
 | |
| 
 | |
|             elif untrusted_key == 'label':
 | |
|                 # don't confuse label name with label index
 | |
|                 assert not untrusted_value.isdigit()
 | |
|                 allowed_chars = string.ascii_letters + string.digits + '-_.'
 | |
|                 assert all(c in allowed_chars for c in untrusted_value)
 | |
|                 try:
 | |
|                     kwargs['label'] = self.app.get_label(untrusted_value)
 | |
|                 except KeyError:
 | |
|                     raise qubes.exc.QubesValueError
 | |
| 
 | |
|             elif untrusted_key == 'pool' and allow_pool:
 | |
|                 if pool is not None:
 | |
|                     raise qubes.api.ProtocolError('duplicated pool parameter')
 | |
|                 pool = self.app.get_pool(untrusted_value)
 | |
|             elif untrusted_key.startswith('pool:') and allow_pool:
 | |
|                 untrusted_volume = untrusted_key.split(':', 1)[1]
 | |
|                 # kind of ugly, but actual list of volumes is available only
 | |
|                 # after creating a VM
 | |
|                 assert untrusted_volume in ['root', 'private', 'volatile',
 | |
|                     'kernel']
 | |
|                 volume = untrusted_volume
 | |
|                 if volume in pools:
 | |
|                     raise qubes.api.ProtocolError(
 | |
|                         'duplicated pool:{} parameter'.format(volume))
 | |
|                 pools[volume] = self.app.get_pool(untrusted_value)
 | |
| 
 | |
|             else:
 | |
|                 raise qubes.api.ProtocolError('Invalid param name')
 | |
|         del untrusted_payload
 | |
| 
 | |
|         if 'name' not in kwargs or 'label' not in kwargs:
 | |
|             raise qubes.api.ProtocolError('Missing name or label')
 | |
| 
 | |
|         if pool and pools:
 | |
|             raise qubes.api.ProtocolError(
 | |
|                 'Only one of \'pool=\' and \'pool:volume=\' can be used')
 | |
| 
 | |
|         if kwargs['name'] in self.app.domains:
 | |
|             raise qubes.exc.QubesValueError(
 | |
|                 'VM {} already exists'.format(kwargs['name']))
 | |
| 
 | |
|         self.fire_event_for_permission(pool=pool, pools=pools, **kwargs)
 | |
| 
 | |
|         vm = self.app.add_new_vm(vm_class, **kwargs)
 | |
|         # TODO: move this to extension (in race-free fashion)
 | |
|         vm.tags.add('created-by-' + str(self.src))
 | |
| 
 | |
|         try:
 | |
|             yield from vm.create_on_disk(pool=pool, pools=pools)
 | |
|         except:
 | |
|             del self.app.domains[vm]
 | |
|             raise
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.CreateDisposable', no_payload=True,
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def create_disposable(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         if self.dest.name == 'dom0':
 | |
|             dispvm_template = self.src.default_dispvm
 | |
|         else:
 | |
|             dispvm_template = self.dest
 | |
| 
 | |
|         self.fire_event_for_permission(dispvm_template=dispvm_template)
 | |
| 
 | |
|         dispvm = yield from qubes.vm.dispvm.DispVM.from_appvm(dispvm_template)
 | |
|         # TODO: move this to extension (in race-free fashion, better than here)
 | |
|         dispvm.tags.add('disp-created-by-' + str(self.src))
 | |
| 
 | |
|         return dispvm.name
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Remove', no_payload=True,
 | |
|         scope='global', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_remove(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         if not self.dest.is_halted():
 | |
|             raise qubes.exc.QubesVMNotHaltedError(self.dest)
 | |
| 
 | |
|         if self.dest.installed_by_rpm:
 | |
|             raise qubes.exc.QubesVMInUseError(self.dest, \
 | |
|                 "VM installed by package manager: " + self.dest.name)
 | |
| 
 | |
|         del self.app.domains[self.dest]
 | |
|         try:
 | |
|             yield from self.dest.remove_from_disk()
 | |
|         except:  # pylint: disable=bare-except
 | |
|             self.app.log.exception('Error wile removing VM \'%s\' files',
 | |
|                 self.dest.name)
 | |
| 
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.device.{endpoint}.Available', endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points('qubes.devices')),
 | |
|             no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_device_available(self, endpoint):
 | |
|         devclass = endpoint
 | |
|         devices = self.dest.devices[devclass].available()
 | |
|         if self.arg:
 | |
|             devices = [dev for dev in devices if dev.ident == self.arg]
 | |
|             # no duplicated devices, but device may not exists, in which case
 | |
|             #  the list is empty
 | |
|             assert len(devices) <= 1
 | |
|         devices = self.fire_event_for_filter(devices, devclass=devclass)
 | |
| 
 | |
|         dev_info = {}
 | |
|         for dev in devices:
 | |
|             non_default_attrs = set(attr for attr in dir(dev) if
 | |
|                 not attr.startswith('_')).difference((
 | |
|                     'backend_domain', 'ident', 'frontend_domain',
 | |
|                     'description', 'options', 'regex'))
 | |
|             properties_txt = ' '.join(
 | |
|                 '{}={!s}'.format(prop, value) for prop, value
 | |
|                 in itertools.chain(
 | |
|                     ((key, getattr(dev, key)) for key in non_default_attrs),
 | |
|                     # keep description as the last one, according to API
 | |
|                     # specification
 | |
|                     (('description', dev.description),)
 | |
|                 ))
 | |
|             assert '\n' not in properties_txt
 | |
|             dev_info[dev.ident] = properties_txt
 | |
| 
 | |
|         return ''.join('{} {}\n'.format(ident, dev_info[ident])
 | |
|             for ident in sorted(dev_info))
 | |
| 
 | |
|     @qubes.api.method('admin.vm.device.{endpoint}.List', endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points('qubes.devices')),
 | |
|             no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_device_list(self, endpoint):
 | |
|         devclass = endpoint
 | |
|         device_assignments = self.dest.devices[devclass].assignments()
 | |
|         if self.arg:
 | |
|             select_backend, select_ident = self.arg.split('+', 1)
 | |
|             device_assignments = [dev for dev in device_assignments
 | |
|                 if (str(dev.backend_domain), dev.ident)
 | |
|                    == (select_backend, select_ident)]
 | |
|             # no duplicated devices, but device may not exists, in which case
 | |
|             #  the list is empty
 | |
|             assert len(device_assignments) <= 1
 | |
|         device_assignments = self.fire_event_for_filter(device_assignments,
 | |
|             devclass=devclass)
 | |
| 
 | |
|         dev_info = {}
 | |
|         for dev in device_assignments:
 | |
|             properties_txt = ' '.join(
 | |
|                 '{}={!s}'.format(opt, value) for opt, value
 | |
|                 in itertools.chain(
 | |
|                     dev.options.items(),
 | |
|                     (('persistent', 'yes' if dev.persistent else 'no'),)
 | |
|                 ))
 | |
|             assert '\n' not in properties_txt
 | |
|             ident = '{!s}+{!s}'.format(dev.backend_domain, dev.ident)
 | |
|             dev_info[ident] = properties_txt
 | |
| 
 | |
|         return ''.join('{} {}\n'.format(ident, dev_info[ident])
 | |
|             for ident in sorted(dev_info))
 | |
| 
 | |
|     # Attach/Detach action can both modify persistent state (with
 | |
|     # persistent=True) and volatile state of running VM (with persistent=False).
 | |
|     # For this reason, write=True + execute=True
 | |
|     @qubes.api.method('admin.vm.device.{endpoint}.Attach', endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points('qubes.devices')),
 | |
|         scope='local', write=True, execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_device_attach(self, endpoint, untrusted_payload):
 | |
|         devclass = endpoint
 | |
|         options = {}
 | |
|         persistent = False
 | |
|         for untrusted_option in untrusted_payload.decode('ascii').split():
 | |
|             try:
 | |
|                 untrusted_key, untrusted_value = untrusted_option.split('=', 1)
 | |
|             except ValueError:
 | |
|                 raise qubes.api.ProtocolError('Invalid options format')
 | |
|             if untrusted_key == 'persistent':
 | |
|                 persistent = qubes.property.bool(None, None, untrusted_value)
 | |
|             else:
 | |
|                 allowed_chars_key = string.digits + string.ascii_letters + '-_.'
 | |
|                 allowed_chars_value = allowed_chars_key + ',+:'
 | |
|                 if any(x not in allowed_chars_key for x in untrusted_key):
 | |
|                     raise qubes.api.ProtocolError(
 | |
|                         'Invalid chars in option name')
 | |
|                 if any(x not in allowed_chars_value for x in untrusted_value):
 | |
|                     raise qubes.api.ProtocolError(
 | |
|                         'Invalid chars in option value')
 | |
|                 options[untrusted_key] = untrusted_value
 | |
| 
 | |
|         # qrexec already verified that no strange characters are in self.arg
 | |
|         backend_domain, ident = self.arg.split('+', 1)
 | |
|         # may raise KeyError, either on domain or ident
 | |
|         dev = self.app.domains[backend_domain].devices[devclass][ident]
 | |
| 
 | |
|         self.fire_event_for_permission(device=dev,
 | |
|             devclass=devclass, persistent=persistent,
 | |
|             options=options)
 | |
| 
 | |
|         assignment = qubes.devices.DeviceAssignment(
 | |
|             dev.backend_domain, dev.ident,
 | |
|             options=options, persistent=persistent)
 | |
|         yield from self.dest.devices[devclass].attach(assignment)
 | |
|         self.app.save()
 | |
| 
 | |
|     # Attach/Detach action can both modify persistent state (with
 | |
|     # persistent=True) and volatile state of running VM (with persistent=False).
 | |
|     # For this reason, write=True + execute=True
 | |
|     @qubes.api.method('admin.vm.device.{endpoint}.Detach', endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points('qubes.devices')),
 | |
|             no_payload=True,
 | |
|         scope='local', write=True, execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_device_detach(self, endpoint):
 | |
|         devclass = endpoint
 | |
| 
 | |
|         # qrexec already verified that no strange characters are in self.arg
 | |
|         backend_domain, ident = self.arg.split('+', 1)
 | |
|         # may raise KeyError; if device isn't found, it will be UnknownDevice
 | |
|         #  instance - but allow it, otherwise it will be impossible to detach
 | |
|         #  already removed device
 | |
|         dev = self.app.domains[backend_domain].devices[devclass][ident]
 | |
| 
 | |
|         self.fire_event_for_permission(device=dev,
 | |
|             devclass=devclass)
 | |
| 
 | |
|         assignment = qubes.devices.DeviceAssignment(
 | |
|             dev.backend_domain, dev.ident)
 | |
|         yield from self.dest.devices[devclass].detach(assignment)
 | |
|         self.app.save()
 | |
| 
 | |
|     # Attach/Detach action can both modify persistent state (with
 | |
|     # persistent=True) and volatile state of running VM (with persistent=False).
 | |
|     # For this reason, write=True + execute=True
 | |
|     @qubes.api.method('admin.vm.device.{endpoint}.Set.persistent',
 | |
|         endpoints=(ep.name
 | |
|             for ep in pkg_resources.iter_entry_points('qubes.devices')),
 | |
|         scope='local', write=True, execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_device_set_persistent(self, endpoint, untrusted_payload):
 | |
|         devclass = endpoint
 | |
| 
 | |
|         assert untrusted_payload in (b'True', b'False')
 | |
|         persistent = untrusted_payload == b'True'
 | |
|         del untrusted_payload
 | |
| 
 | |
|         # qrexec already verified that no strange characters are in self.arg
 | |
|         backend_domain, ident = self.arg.split('+', 1)
 | |
|         # device must be already attached
 | |
|         matching_devices = [dev for dev
 | |
|             in self.dest.devices[devclass].attached()
 | |
|             if dev.backend_domain.name == backend_domain and dev.ident == ident]
 | |
|         assert len(matching_devices) == 1
 | |
|         dev = matching_devices[0]
 | |
| 
 | |
|         self.fire_event_for_permission(device=dev,
 | |
|             persistent=persistent)
 | |
| 
 | |
|         self.dest.devices[devclass].update_persistent(dev, persistent)
 | |
|         self.app.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.firewall.Get', no_payload=True,
 | |
|             scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_firewall_get(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         return ''.join('{}\n'.format(rule.api_rule)
 | |
|             for rule in self.dest.firewall.rules
 | |
|             if rule.api_rule is not None)
 | |
| 
 | |
|     @qubes.api.method('admin.vm.firewall.Set',
 | |
|             scope='local', write=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_firewall_set(self, untrusted_payload):
 | |
|         assert not self.arg
 | |
|         rules = []
 | |
|         for untrusted_line in untrusted_payload.decode('ascii',
 | |
|                 errors='strict').splitlines():
 | |
|             rule = qubes.firewall.Rule.from_api_string(
 | |
|                 untrusted_rule=untrusted_line)
 | |
|             rules.append(rule)
 | |
| 
 | |
|         self.fire_event_for_permission(rules=rules)
 | |
| 
 | |
|         self.dest.firewall.rules = rules
 | |
|         self.dest.firewall.save()
 | |
| 
 | |
|     @qubes.api.method('admin.vm.firewall.Reload', no_payload=True,
 | |
|             scope='local', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_firewall_reload(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         self.dest.fire_event('firewall-changed')
 | |
| 
 | |
|     @asyncio.coroutine
 | |
|     def _load_backup_profile(self, profile_name, skip_passphrase=False):
 | |
|         '''Load backup profile and return :py:class:`qubes.backup.Backup`
 | |
|         instance
 | |
| 
 | |
|         :param profile_name: name of the profile
 | |
|         :param skip_passphrase: do not load passphrase - only backup summary
 | |
|             can be retrieved when this option is in use
 | |
|         '''
 | |
|         profile_path = os.path.join(
 | |
|             qubes.config.backup_profile_dir, profile_name + '.conf')
 | |
| 
 | |
|         with open(profile_path) as profile_file:
 | |
|             profile_data = yaml.safe_load(profile_file)
 | |
| 
 | |
|         try:
 | |
|             dest_vm = profile_data['destination_vm']
 | |
|             dest_path = profile_data['destination_path']
 | |
|             include_vms = profile_data['include']
 | |
|             if include_vms is not None:
 | |
|                 # convert old keywords to new keywords
 | |
|                 include_vms = [vm.replace('$', '@') for vm in include_vms]
 | |
|             exclude_vms = profile_data.get('exclude', [])
 | |
|             # convert old keywords to new keywords
 | |
|             exclude_vms = [vm.replace('$', '@') for vm in exclude_vms]
 | |
|             compression = profile_data.get('compression', True)
 | |
|         except KeyError as err:
 | |
|             raise qubes.exc.QubesException(
 | |
|                 'Invalid backup profile - missing {}'.format(err))
 | |
| 
 | |
|         try:
 | |
|             dest_vm = self.app.domains[dest_vm]
 | |
|         except KeyError:
 | |
|             raise qubes.exc.QubesException(
 | |
|                 'Invalid destination_vm specified in backup profile')
 | |
| 
 | |
|         if isinstance(dest_vm, qubes.vm.adminvm.AdminVM):
 | |
|             dest_vm = None
 | |
| 
 | |
|         if skip_passphrase:
 | |
|             passphrase = None
 | |
|         elif 'passphrase_text' in profile_data:
 | |
|             passphrase = profile_data['passphrase_text']
 | |
|         elif 'passphrase_vm' in profile_data:
 | |
|             passphrase_vm_name = profile_data['passphrase_vm']
 | |
|             try:
 | |
|                 passphrase_vm = self.app.domains[passphrase_vm_name]
 | |
|             except KeyError:
 | |
|                 raise qubes.exc.QubesException(
 | |
|                     'Invalid backup profile - invalid passphrase_vm')
 | |
|             try:
 | |
|                 passphrase, _ = yield from passphrase_vm.run_service_for_stdio(
 | |
|                     'qubes.BackupPassphrase+' + self.arg)
 | |
|                 # make it foolproof against "echo passphrase" implementation
 | |
|                 passphrase = passphrase.strip()
 | |
|                 assert b'\n' not in passphrase
 | |
|             except subprocess.CalledProcessError:
 | |
|                 raise qubes.exc.QubesException(
 | |
|                     'Failed to retrieve passphrase from \'{}\' VM'.format(
 | |
|                         passphrase_vm_name))
 | |
|         else:
 | |
|             raise qubes.exc.QubesException(
 | |
|                 'Invalid backup profile - you need to '
 | |
|                 'specify passphrase_text or passphrase_vm')
 | |
| 
 | |
|         # handle include
 | |
|         if include_vms is None:
 | |
|             vms_to_backup = None
 | |
|         else:
 | |
|             vms_to_backup = set(vm for vm in self.app.domains
 | |
|                 if any(qubes.utils.match_vm_name_with_special(vm, name)
 | |
|                     for name in include_vms))
 | |
| 
 | |
|             # handle exclude
 | |
|             vms_to_backup.difference_update(vm for vm in self.app.domains
 | |
|                 if any(qubes.utils.match_vm_name_with_special(vm, name)
 | |
|                     for name in exclude_vms))
 | |
| 
 | |
|         kwargs = {
 | |
|             'target_vm': dest_vm,
 | |
|             'target_dir': dest_path,
 | |
|             'compressed': bool(compression),
 | |
|             'passphrase': passphrase,
 | |
|         }
 | |
|         if isinstance(compression, str):
 | |
|             kwargs['compression_filter'] = compression
 | |
|         backup = qubes.backup.Backup(self.app, vms_to_backup, **kwargs)
 | |
|         return backup
 | |
| 
 | |
|     def _backup_progress_callback(self, profile_name, progress):
 | |
|         self.app.fire_event('backup-progress', backup_profile=profile_name,
 | |
|             progress=progress)
 | |
| 
 | |
|     @qubes.api.method('admin.backup.Execute', no_payload=True,
 | |
|         scope='global', read=True, execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def backup_execute(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert self.arg
 | |
|         assert '/' not in self.arg
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         profile_path = os.path.join(qubes.config.backup_profile_dir,
 | |
|             self.arg + '.conf')
 | |
|         if not os.path.exists(profile_path):
 | |
|             raise qubes.api.PermissionDenied(
 | |
|                 'Backup profile {} does not exist'.format(self.arg))
 | |
| 
 | |
|         if not hasattr(self.app, 'api_admin_running_backups'):
 | |
|             self.app.api_admin_running_backups = {}
 | |
| 
 | |
|         backup = yield from self._load_backup_profile(self.arg)
 | |
|         backup.progress_callback = functools.partial(
 | |
|             self._backup_progress_callback, self.arg)
 | |
| 
 | |
|         # forbid running the same backup operation twice at the time
 | |
|         assert self.arg not in self.app.api_admin_running_backups
 | |
| 
 | |
|         backup_task = asyncio.ensure_future(backup.backup_do())
 | |
|         self.app.api_admin_running_backups[self.arg] = backup_task
 | |
|         try:
 | |
|             yield from backup_task
 | |
|         except asyncio.CancelledError:
 | |
|             raise qubes.exc.QubesException('Backup cancelled')
 | |
|         finally:
 | |
|             del self.app.api_admin_running_backups[self.arg]
 | |
| 
 | |
|     @qubes.api.method('admin.backup.Cancel', no_payload=True,
 | |
|         scope='global', execute=True)
 | |
|     @asyncio.coroutine
 | |
|     def backup_cancel(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert self.arg
 | |
|         assert '/' not in self.arg
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         if not hasattr(self.app, 'api_admin_running_backups'):
 | |
|             self.app.api_admin_running_backups = {}
 | |
| 
 | |
|         if self.arg not in self.app.api_admin_running_backups:
 | |
|             raise qubes.exc.QubesException('Backup operation not running')
 | |
| 
 | |
|         self.app.api_admin_running_backups[self.arg].cancel()
 | |
| 
 | |
|     @qubes.api.method('admin.backup.Info', no_payload=True,
 | |
|         scope='local', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def backup_info(self):
 | |
|         assert self.dest.name == 'dom0'
 | |
|         assert self.arg
 | |
|         assert '/' not in self.arg
 | |
| 
 | |
|         self.fire_event_for_permission()
 | |
| 
 | |
|         profile_path = os.path.join(qubes.config.backup_profile_dir,
 | |
|             self.arg + '.conf')
 | |
|         if not os.path.exists(profile_path):
 | |
|             raise qubes.api.PermissionDenied(
 | |
|                 'Backup profile {} does not exist'.format(self.arg))
 | |
| 
 | |
|         backup = yield from self._load_backup_profile(self.arg,
 | |
|             skip_passphrase=True)
 | |
|         return backup.get_backup_summary()
 | |
| 
 | |
|     def _send_stats_single(self, info_time, info, only_vm, filters,
 | |
|             id_to_name_map):
 | |
|         '''A single iteration of sending VM stats
 | |
| 
 | |
|         :param info_time: time of previous iteration
 | |
|         :param info: information retrieved in previous iteration
 | |
|         :param only_vm: send information only about this VM
 | |
|         :param filters: filters to apply on stats before sending
 | |
|         :param id_to_name_map: ID->VM name map, may be modified
 | |
|         :return: tuple(info_time, info) - new information (to be passed to
 | |
|         the next iteration)
 | |
|         '''
 | |
| 
 | |
|         (info_time, info) = self.app.host.get_vm_stats(info_time, info,
 | |
|             only_vm=only_vm)
 | |
|         for vm_id, vm_info in info.items():
 | |
|             if vm_id not in id_to_name_map:
 | |
|                 try:
 | |
|                     name = \
 | |
|                         self.app.vmm.libvirt_conn.lookupByID(vm_id).name()
 | |
|                 except libvirt.libvirtError as err:
 | |
|                     if err.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
 | |
|                         # stubdomain or so
 | |
|                         name = None
 | |
|                     else:
 | |
|                         raise
 | |
|                 id_to_name_map[vm_id] = name
 | |
|             else:
 | |
|                 name = id_to_name_map[vm_id]
 | |
| 
 | |
|             # skip VMs with unknown name
 | |
|             if name is None:
 | |
|                 continue
 | |
| 
 | |
|             if not list(qubes.api.apply_filters([name], filters)):
 | |
|                 continue
 | |
| 
 | |
|             self.send_event(name, 'vm-stats',
 | |
|                 memory_kb=int(vm_info['memory_kb']),
 | |
|                 cpu_time=int(vm_info['cpu_time'] / 1000000),
 | |
|                 cpu_usage=int(vm_info['cpu_usage']))
 | |
| 
 | |
|         return info_time, info
 | |
| 
 | |
|     @qubes.api.method('admin.vm.Stats', no_payload=True,
 | |
|         scope='global', read=True)
 | |
|     @asyncio.coroutine
 | |
|     def vm_stats(self):
 | |
|         assert not self.arg
 | |
| 
 | |
|         # run until client connection is terminated
 | |
|         self.cancellable = True
 | |
| 
 | |
|         # cache event filters, to not call an event each time an event arrives
 | |
|         stats_filters = self.fire_event_for_permission()
 | |
| 
 | |
|         only_vm = None
 | |
|         if self.dest.name != 'dom0':
 | |
|             only_vm = self.dest
 | |
| 
 | |
|         self.send_event(self.app, 'connection-established')
 | |
| 
 | |
|         info_time = None
 | |
|         info = None
 | |
|         id_to_name_map = {0: 'dom0'}
 | |
|         try:
 | |
|             while True:
 | |
|                 info_time, info = self._send_stats_single(info_time, info,
 | |
|                     only_vm, stats_filters, id_to_name_map)
 | |
|                 yield from asyncio.sleep(self.app.stats_interval)
 | |
|         except asyncio.CancelledError:
 | |
|             # valid method to terminate this loop
 | |
|             pass
 | 
