123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230 |
- # -*- encoding: utf-8 -*-
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2017 Marek Marczykowski-Górecki
- # <marmarek@invisiblethingslab.com>
- #
- # This library is free software; you can redistribute it and/or
- # modify it under the terms of the GNU Lesser General Public
- # License as published by the Free Software Foundation; either
- # version 2.1 of the License, or (at your option) any later version.
- #
- # This library is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- # Lesser General Public License for more details.
- #
- # You should have received a copy of the GNU Lesser General Public
- # License along with this library; if not, see <https://www.gnu.org/licenses/>.
- ''' Internal interface for dom0 components to communicate with qubesd. '''
- import asyncio
- import json
- import subprocess
- import qubes.api
- import qubes.api.admin
- import qubes.vm.adminvm
- import qubes.vm.dispvm
- class QubesInternalAPI(qubes.api.AbstractQubesAPI):
- ''' Communication interface for dom0 components,
- by design the input here is trusted.'''
- SOCKNAME = '/var/run/qubesd.internal.sock'
- @qubes.api.method('internal.GetSystemInfo', no_payload=True)
- @asyncio.coroutine
- def getsysteminfo(self):
- self.enforce(self.dest.name == 'dom0')
- self.enforce(not self.arg)
- system_info = {'domains': {
- domain.name: {
- 'tags': list(domain.tags),
- 'type': domain.__class__.__name__,
- 'template_for_dispvms':
- getattr(domain, 'template_for_dispvms', False),
- 'default_dispvm': (domain.default_dispvm.name if
- getattr(domain, 'default_dispvm', None) else None),
- 'icon': str(domain.label.icon),
- 'guivm': (domain.guivm.name if getattr(domain, 'guivm', None)
- else None),
- } for domain in self.app.domains
- }}
- return json.dumps(system_info)
- @qubes.api.method('internal.vm.volume.ImportBegin',
- scope='local', write=True)
- @asyncio.coroutine
- def vm_volume_import(self, untrusted_payload):
- """Begin importing volume data. Payload is either size of new data
- in bytes, or empty. If empty, the current volume's size will be used.
- Returns size and path to where data should be written.
- Triggered by scripts in /etc/qubes-rpc:
- admin.vm.volume.Import, admin.vm.volume.ImportWithSize.
- When the script finish importing, it will trigger
- internal.vm.volume.ImportEnd (with either b'ok' or b'fail' as a
- payload) and response from that call will be actually send to the
- caller.
- """
- self.enforce(self.arg in self.dest.volumes.keys())
- if untrusted_payload:
- original_method = 'admin.vm.volume.ImportWithSize'
- else:
- original_method = 'admin.vm.volume.Import'
- self.src.fire_event(
- 'admin-permission:' + original_method,
- pre_event=True, dest=self.dest, arg=self.arg)
- if not self.dest.is_halted():
- raise qubes.exc.QubesVMNotHaltedError(self.dest)
- requested_size = None
- if untrusted_payload:
- try:
- untrusted_value = int(untrusted_payload.decode('ascii'))
- except (UnicodeDecodeError, ValueError):
- raise qubes.api.ProtocolError('Invalid value')
- self.enforce(untrusted_value > 0)
- requested_size = untrusted_value
- del untrusted_value
- del untrusted_payload
- path = yield from self.dest.storage.import_data(
- self.arg, requested_size)
- self.enforce(' ' not in path)
- if requested_size is None:
- size = self.dest.volumes[self.arg].size
- else:
- size = requested_size
- # when we know the action is allowed, inform extensions that it will
- # be performed
- self.dest.fire_event(
- 'domain-volume-import-begin', volume=self.arg, size=size)
- return '{} {}'.format(size, path)
- @qubes.api.method('internal.vm.volume.ImportEnd')
- @asyncio.coroutine
- def vm_volume_import_end(self, untrusted_payload):
- '''
- This is second half of admin.vm.volume.Import handling. It is called
- when actual import is finished. Response from this method is sent do
- the client (as a response for admin.vm.volume.Import call).
- The payload is either 'ok', or 'fail\n<error message>'.
- '''
- self.enforce(self.arg in self.dest.volumes.keys())
- success = untrusted_payload == b'ok'
- try:
- yield from self.dest.storage.import_data_end(self.arg,
- success=success)
- except:
- self.dest.fire_event('domain-volume-import-end', volume=self.arg,
- success=False)
- raise
- self.dest.fire_event('domain-volume-import-end', volume=self.arg,
- success=success)
- if not success:
- error = ''
- parts = untrusted_payload.decode('ascii').split('\n', 1)
- if len(parts) > 1:
- error = parts[1]
- raise qubes.exc.QubesException(
- 'Data import failed: {}'.format(error))
- @qubes.api.method('internal.SuspendPre', no_payload=True)
- @asyncio.coroutine
- def suspend_pre(self):
- '''
- Method called before host system goes to sleep.
- :return:
- '''
- # first notify all VMs
- processes = []
- for vm in self.app.domains:
- if isinstance(vm, qubes.vm.adminvm.AdminVM):
- continue
- if not vm.is_running():
- continue
- if not vm.features.check_with_template('qrexec', False):
- continue
- try:
- proc = yield from vm.run_service(
- 'qubes.SuspendPreAll', user='root',
- stdin=subprocess.DEVNULL,
- stdout=subprocess.DEVNULL,
- stderr=subprocess.DEVNULL)
- processes.append(proc)
- except qubes.exc.QubesException as e:
- vm.log.warning('Failed to run qubes.SuspendPreAll: %s', str(e))
- # FIXME: some timeout?
- if processes:
- yield from asyncio.wait([p.wait() for p in processes])
- coros = []
- # then suspend/pause VMs
- for vm in self.app.domains:
- if isinstance(vm, qubes.vm.adminvm.AdminVM):
- continue
- if vm.is_running():
- coros.append(vm.suspend())
- if coros:
- yield from asyncio.wait(coros)
- @qubes.api.method('internal.SuspendPost', no_payload=True)
- @asyncio.coroutine
- def suspend_post(self):
- '''
- Method called after host system wake up from sleep.
- :return:
- '''
- coros = []
- # first resume/unpause VMs
- for vm in self.app.domains:
- if isinstance(vm, qubes.vm.adminvm.AdminVM):
- continue
- if vm.get_power_state() in ["Paused", "Suspended"]:
- coros.append(vm.resume())
- if coros:
- yield from asyncio.wait(coros)
- # then notify all VMs
- processes = []
- for vm in self.app.domains:
- if isinstance(vm, qubes.vm.adminvm.AdminVM):
- continue
- if not vm.is_running():
- continue
- if not vm.features.check_with_template('qrexec', False):
- continue
- try:
- proc = yield from vm.run_service(
- 'qubes.SuspendPostAll', user='root',
- stdin=subprocess.DEVNULL,
- stdout=subprocess.DEVNULL,
- stderr=subprocess.DEVNULL)
- processes.append(proc)
- except qubes.exc.QubesException as e:
- vm.log.warning('Failed to run qubes.SuspendPostAll: %s', str(e))
- # FIXME: some timeout?
- if processes:
- yield from asyncio.wait([p.wait() for p in processes])
|