app.py 41 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270
  1. #
  2. # The Qubes OS Project, https://www.qubes-os.org/
  3. #
  4. # Copyright (C) 2010-2015 Joanna Rutkowska <joanna@invisiblethingslab.com>
  5. # Copyright (C) 2011-2015 Marek Marczykowski-Górecki
  6. # <marmarek@invisiblethingslab.com>
  7. # Copyright (C) 2014-2015 Wojtek Porczyk <woju@invisiblethingslab.com>
  8. #
  9. # This program is free software; you can redistribute it and/or modify
  10. # it under the terms of the GNU General Public License as published by
  11. # the Free Software Foundation; either version 2 of the License, or
  12. # (at your option) any later version.
  13. #
  14. # This program is distributed in the hope that it will be useful,
  15. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. # GNU General Public License for more details.
  18. #
  19. # You should have received a copy of the GNU General Public License along
  20. # with this program; if not, write to the Free Software Foundation, Inc.,
  21. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  22. #
  23. import collections
  24. import errno
  25. import functools
  26. import grp
  27. import logging
  28. import os
  29. import random
  30. import subprocess
  31. import sys
  32. import tempfile
  33. import time
  34. import traceback
  35. import uuid
  36. import itertools
  37. import lxml.etree
  38. import jinja2
  39. import libvirt
  40. try:
  41. import xen.lowlevel.xs # pylint: disable=wrong-import-order
  42. import xen.lowlevel.xc # pylint: disable=wrong-import-order
  43. except ImportError:
  44. pass
  45. if os.name == 'posix':
  46. # pylint: disable=wrong-import-order
  47. import fcntl
  48. elif os.name == 'nt':
  49. # pylint: disable=import-error
  50. import win32con
  51. import win32file
  52. import pywintypes
  53. else:
  54. raise RuntimeError("Qubes works only on POSIX or WinNT systems")
  55. # pylint: disable=wrong-import-position
  56. import qubes
  57. import qubes.ext
  58. import qubes.utils
  59. import qubes.storage
  60. import qubes.vm
  61. import qubes.vm.adminvm
  62. import qubes.vm.qubesvm
  63. import qubes.vm.templatevm
  64. # pylint: enable=wrong-import-position
  65. class VirDomainWrapper(object):
  66. # pylint: disable=too-few-public-methods
  67. def __init__(self, connection, vm):
  68. self._connection = connection
  69. self._vm = vm
  70. def _reconnect_if_dead(self):
  71. is_dead = not self._vm.connect().isAlive()
  72. if is_dead:
  73. # pylint: disable=protected-access
  74. self._connection._reconnect_if_dead()
  75. self._vm = self._connection._conn.lookupByUUID(self._vm.UUID())
  76. return is_dead
  77. def __getattr__(self, attrname):
  78. attr = getattr(self._vm, attrname)
  79. if not isinstance(attr, collections.Callable):
  80. return attr
  81. @functools.wraps(attr)
  82. def wrapper(*args, **kwargs):
  83. try:
  84. return attr(*args, **kwargs)
  85. except libvirt.libvirtError:
  86. if self._reconnect_if_dead():
  87. return getattr(self._vm, attrname)(*args, **kwargs)
  88. raise
  89. return wrapper
  90. class VirConnectWrapper(object):
  91. # pylint: disable=too-few-public-methods
  92. def __init__(self, uri):
  93. self._conn = libvirt.open(uri)
  94. def _reconnect_if_dead(self):
  95. is_dead = not self._conn.isAlive()
  96. if is_dead:
  97. self._conn = libvirt.open(self._conn.getURI())
  98. # TODO: re-register event handlers
  99. return is_dead
  100. def _wrap_domain(self, ret):
  101. if isinstance(ret, libvirt.virDomain):
  102. ret = VirDomainWrapper(self, ret)
  103. return ret
  104. def __getattr__(self, attrname):
  105. attr = getattr(self._conn, attrname)
  106. if not isinstance(attr, collections.Callable):
  107. return attr
  108. if attrname == 'close':
  109. return attr
  110. @functools.wraps(attr)
  111. def wrapper(*args, **kwargs):
  112. try:
  113. return self._wrap_domain(attr(*args, **kwargs))
  114. except libvirt.libvirtError:
  115. if self._reconnect_if_dead():
  116. return self._wrap_domain(
  117. getattr(self._conn, attrname)(*args, **kwargs))
  118. raise
  119. return wrapper
  120. class VMMConnection(object):
  121. '''Connection to Virtual Machine Manager (libvirt)'''
  122. def __init__(self, offline_mode=None):
  123. '''
  124. :param offline_mode: enable/disable offline mode; default is to
  125. enable when running in chroot as root, otherwise disable
  126. '''
  127. if offline_mode is None:
  128. offline_mode = bool(os.getuid() == 0 and
  129. os.stat('/') != os.stat('/proc/1/root/.'))
  130. self._offline_mode = offline_mode
  131. self._libvirt_conn = None
  132. self._xs = None
  133. self._xc = None
  134. @property
  135. def offline_mode(self):
  136. '''Check or enable offline mode (do not actually connect to vmm)'''
  137. return self._offline_mode
  138. def _libvirt_error_handler(self, ctx, error):
  139. pass
  140. def init_vmm_connection(self):
  141. '''Initialise connection
  142. This method is automatically called when getting'''
  143. if self._libvirt_conn is not None:
  144. # Already initialized
  145. return
  146. if self._offline_mode:
  147. # Do not initialize in offline mode
  148. raise qubes.exc.QubesException(
  149. 'VMM operations disabled in offline mode')
  150. if 'xen.lowlevel.xs' in sys.modules:
  151. self._xs = xen.lowlevel.xs.xs()
  152. if 'xen.lowlevel.xc' in sys.modules:
  153. self._xc = xen.lowlevel.xc.xc()
  154. self._libvirt_conn = VirConnectWrapper(
  155. qubes.config.defaults['libvirt_uri'])
  156. libvirt.registerErrorHandler(self._libvirt_error_handler, None)
  157. @property
  158. def libvirt_conn(self):
  159. '''Connection to libvirt'''
  160. self.init_vmm_connection()
  161. return self._libvirt_conn
  162. @property
  163. def xs(self):
  164. '''Connection to Xen Store
  165. This property in available only when running on Xen.
  166. '''
  167. # XXX what about the case when we run under KVM,
  168. # but xen modules are importable?
  169. if 'xen.lowlevel.xs' not in sys.modules:
  170. raise AttributeError(
  171. 'xs object is available under Xen hypervisor only')
  172. self.init_vmm_connection()
  173. return self._xs
  174. @property
  175. def xc(self):
  176. '''Connection to Xen
  177. This property in available only when running on Xen.
  178. '''
  179. # XXX what about the case when we run under KVM,
  180. # but xen modules are importable?
  181. if 'xen.lowlevel.xc' not in sys.modules:
  182. raise AttributeError(
  183. 'xc object is available under Xen hypervisor only')
  184. self.init_vmm_connection()
  185. return self._xc
  186. def close(self):
  187. libvirt.registerErrorHandler(None, None)
  188. if self._xs:
  189. self._xs.close()
  190. self._xs = None
  191. if self._libvirt_conn:
  192. self._libvirt_conn.close()
  193. self._libvirt_conn = None
  194. self._xc = None # and pray it will get garbage-collected
  195. class QubesHost(object):
  196. '''Basic information about host machine
  197. :param qubes.Qubes app: Qubes application context (must have \
  198. :py:attr:`Qubes.vmm` attribute defined)
  199. '''
  200. def __init__(self, app):
  201. self.app = app
  202. self._no_cpus = None
  203. self._total_mem = None
  204. self._physinfo = None
  205. def _fetch(self):
  206. if self._no_cpus is not None:
  207. return
  208. # pylint: disable=unused-variable
  209. (model, memory, cpus, mhz, nodes, socket, cores, threads) = \
  210. self.app.vmm.libvirt_conn.getInfo()
  211. self._total_mem = int(memory) * 1024
  212. self._no_cpus = cpus
  213. self.app.log.debug('QubesHost: no_cpus={} memory_total={}'.format(
  214. self.no_cpus, self.memory_total))
  215. try:
  216. self.app.log.debug('QubesHost: xen_free_memory={}'.format(
  217. self.get_free_xen_memory()))
  218. except NotImplementedError:
  219. pass
  220. @property
  221. def memory_total(self):
  222. '''Total memory, in kbytes'''
  223. if self.app.vmm.offline_mode:
  224. return 2**64-1
  225. self._fetch()
  226. return self._total_mem
  227. @property
  228. def no_cpus(self):
  229. '''Number of CPUs'''
  230. if self.app.vmm.offline_mode:
  231. return 42
  232. self._fetch()
  233. return self._no_cpus
  234. def get_free_xen_memory(self):
  235. '''Get free memory from Xen's physinfo.
  236. :raises NotImplementedError: when not under Xen
  237. '''
  238. try:
  239. self._physinfo = self.app.xc.physinfo()
  240. except AttributeError:
  241. raise NotImplementedError('This function requires Xen hypervisor')
  242. return int(self._physinfo['free_memory'])
  243. def get_vm_stats(self, previous_time=None, previous=None, only_vm=None):
  244. '''Measure cpu usage for all domains at once.
  245. If previous measurements are given, CPU usage will be given in
  246. percents of time. Otherwise only absolute value (seconds).
  247. Return a tuple of (measurements_time, measurements),
  248. where measurements is a dictionary with key: domid, value: dict:
  249. - cpu_time - absolute CPU usage (seconds since its startup)
  250. - cpu_usage - CPU usage in %
  251. - memory_kb - current memory assigned, in kb
  252. This function requires Xen hypervisor.
  253. ..warning:
  254. This function may return info about implementation-specific VMs,
  255. like stubdomains for HVM
  256. :param previous: previous measurement
  257. :param previous_time: time of previous measurement
  258. :param only_vm: get measurements only for this VM
  259. :raises NotImplementedError: when not under Xen
  260. '''
  261. if (previous_time is None) != (previous is None):
  262. raise ValueError(
  263. 'previous and previous_time must be given together (or none)')
  264. if previous is None:
  265. previous = {}
  266. current_time = time.time()
  267. current = {}
  268. try:
  269. if only_vm:
  270. xid = only_vm.xid
  271. if xid < 0:
  272. raise qubes.exc.QubesVMNotRunningError(only_vm)
  273. info = self.app.vmm.xc.domain_getinfo(xid, 1)
  274. if info[0]['domid'] != xid:
  275. raise qubes.exc.QubesVMNotRunningError(only_vm)
  276. else:
  277. info = self.app.vmm.xc.domain_getinfo(0, 1024)
  278. except AttributeError:
  279. raise NotImplementedError(
  280. 'This function requires Xen hypervisor')
  281. # TODO: add stubdomain stats to actual VMs
  282. for vm in info:
  283. domid = vm['domid']
  284. current[domid] = {}
  285. current[domid]['memory_kb'] = vm['mem_kb']
  286. current[domid]['cpu_time'] = int(
  287. vm['cpu_time'] / max(vm['online_vcpus'], 1))
  288. if domid in previous:
  289. current[domid]['cpu_usage'] = int(
  290. (current[domid]['cpu_time'] - previous[domid]['cpu_time'])
  291. / 1000 ** 3 * 100 / (current_time - previous_time))
  292. if current[domid]['cpu_usage'] < 0:
  293. # VM has been rebooted
  294. current[domid]['cpu_usage'] = 0
  295. else:
  296. current[domid]['cpu_usage'] = 0
  297. return (current_time, current)
  298. class VMCollection(object):
  299. '''A collection of Qubes VMs
  300. VMCollection supports ``in`` operator. You may test for ``qid``, ``name``
  301. and whole VM object's presence.
  302. Iterating over VMCollection will yield machine objects.
  303. '''
  304. def __init__(self, app):
  305. self.app = app
  306. self._dict = dict()
  307. def close(self):
  308. del self.app
  309. self._dict.clear()
  310. del self._dict
  311. def __repr__(self):
  312. return '<{} {!r}>'.format(
  313. self.__class__.__name__, list(sorted(self.keys())))
  314. def items(self):
  315. '''Iterate over ``(qid, vm)`` pairs'''
  316. for qid in self.qids():
  317. yield (qid, self[qid])
  318. def qids(self):
  319. '''Iterate over all qids
  320. qids are sorted by numerical order.
  321. '''
  322. return iter(sorted(self._dict.keys()))
  323. keys = qids
  324. def names(self):
  325. '''Iterate over all names
  326. names are sorted by lexical order.
  327. '''
  328. return iter(sorted(vm.name for vm in self._dict.values()))
  329. def vms(self):
  330. '''Iterate over all machines
  331. vms are sorted by qid.
  332. '''
  333. return iter(sorted(self._dict.values()))
  334. __iter__ = vms
  335. values = vms
  336. def add(self, value, _enable_events=True):
  337. '''Add VM to collection
  338. :param qubes.vm.BaseVM value: VM to add
  339. :raises TypeError: when value is of wrong type
  340. :raises ValueError: when there is already VM which has equal ``qid``
  341. '''
  342. # this violates duck typing, but is needed
  343. # for VMProperty to function correctly
  344. if not isinstance(value, qubes.vm.BaseVM):
  345. raise TypeError('{} holds only BaseVM instances'.format(
  346. self.__class__.__name__))
  347. if value.qid in self:
  348. raise ValueError('This collection already holds VM that has '
  349. 'qid={!r} ({!r})'.format(value.qid, self[value.qid]))
  350. if value.name in self:
  351. raise ValueError('A VM named {!s} already exists'
  352. .format(value.name))
  353. self._dict[value.qid] = value
  354. if _enable_events:
  355. value.events_enabled = True
  356. self.app.fire_event('domain-add', vm=value)
  357. return value
  358. def __getitem__(self, key):
  359. if isinstance(key, int):
  360. return self._dict[key]
  361. if isinstance(key, str):
  362. for vm in self:
  363. if vm.name == key:
  364. return vm
  365. raise KeyError(key)
  366. if isinstance(key, qubes.vm.BaseVM):
  367. key = key.uuid
  368. if isinstance(key, uuid.UUID):
  369. for vm in self:
  370. if vm.uuid == key:
  371. return vm
  372. raise KeyError(key)
  373. raise KeyError(key)
  374. def __delitem__(self, key):
  375. vm = self[key]
  376. if not vm.is_halted():
  377. raise qubes.exc.QubesVMNotHaltedError(vm)
  378. self.app.fire_event('domain-pre-delete', pre_event=True, vm=vm)
  379. try:
  380. vm.libvirt_domain.undefine()
  381. except libvirt.libvirtError as e:
  382. if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
  383. # already undefined
  384. pass
  385. del self._dict[vm.qid]
  386. self.app.fire_event('domain-delete', vm=vm)
  387. def __contains__(self, key):
  388. return any((key == vm or key == vm.qid or key == vm.name)
  389. for vm in self)
  390. def __len__(self):
  391. return len(self._dict)
  392. def get_vms_based_on(self, template):
  393. template = self[template]
  394. return set(vm for vm in self
  395. if hasattr(vm, 'template') and vm.template == template)
  396. def get_vms_connected_to(self, netvm):
  397. new_vms = set([self[netvm]])
  398. dependent_vms = set()
  399. # Dependency resolving only makes sense on NetVM (or derivative)
  400. # if not self[netvm_qid].is_netvm():
  401. # return set([])
  402. while new_vms:
  403. cur_vm = new_vms.pop()
  404. for vm in cur_vm.connected_vms:
  405. if vm in dependent_vms:
  406. continue
  407. dependent_vms.add(vm)
  408. # if vm.is_netvm():
  409. new_vms.add(vm)
  410. return dependent_vms
  411. # XXX with Qubes Admin Api this will probably lead to race condition
  412. # whole process of creating and adding should be synchronised
  413. def get_new_unused_qid(self):
  414. used_ids = set(self.qids())
  415. for i in range(1, qubes.config.max_qid):
  416. if i not in used_ids:
  417. return i
  418. raise LookupError("Cannot find unused qid!")
  419. def get_new_unused_netid(self):
  420. used_ids = set([vm.netid for vm in self]) # if vm.is_netvm()])
  421. for i in range(1, qubes.config.max_netid):
  422. if i not in used_ids:
  423. return i
  424. raise LookupError("Cannot find unused netid!")
  425. def get_new_unused_dispid(self):
  426. for _ in range(int(qubes.config.max_dispid ** 0.5)):
  427. dispid = random.SystemRandom().randrange(qubes.config.max_dispid)
  428. if not any(getattr(vm, 'dispid', None) == dispid for vm in self):
  429. return dispid
  430. raise LookupError((
  431. 'https://xkcd.com/221/',
  432. 'http://dilbert.com/strip/2001-10-25')[random.randint(0, 1)])
  433. def _default_pool(app):
  434. ''' Default storage pool.
  435. 1. If there is one named 'default', use it.
  436. 2. Check if root fs is on LVM thin - use that
  437. 3. Look for file-based pool pointing /var/lib/qubes
  438. 4. Fail
  439. '''
  440. if 'default' in app.pools:
  441. return app.pools['default']
  442. else:
  443. rootfs = os.stat('/')
  444. root_major = (rootfs.st_dev & 0xff00) >> 8
  445. root_minor = rootfs.st_dev & 0xff
  446. for pool in app.pools.values():
  447. if pool.config.get('driver', None) != 'lvm_thin':
  448. continue
  449. thin_pool = pool.config['thin_pool']
  450. thin_volumes = subprocess.check_output(
  451. ['lvs', '--select', 'pool_lv=' + thin_pool,
  452. '-o', 'lv_kernel_major,lv_kernel_minor', '--noheadings'])
  453. thin_volumes = thin_volumes.decode()
  454. if any([str(root_major), str(root_minor)] == thin_vol.split()
  455. for thin_vol in thin_volumes.splitlines()):
  456. return pool
  457. # not a thin volume? look for file pools
  458. for pool in app.pools.values():
  459. if pool.config.get('driver', None) != 'file':
  460. continue
  461. if pool.config['dir_path'] == qubes.config.qubes_base_dir:
  462. return pool
  463. raise AttributeError('Cannot determine default storage pool')
  464. def _setter_pool(app, prop, value):
  465. if isinstance(value, qubes.storage.Pool):
  466. return value
  467. try:
  468. return app.pools[value]
  469. except KeyError:
  470. raise qubes.exc.QubesPropertyValueError(app, prop, value,
  471. 'No such storage pool')
  472. class Qubes(qubes.PropertyHolder):
  473. '''Main Qubes application
  474. :param str store: path to ``qubes.xml``
  475. The store is loaded in stages:
  476. 1. In the first stage there are loaded some basic features from store
  477. (currently labels).
  478. 2. In the second stage stubs for all VMs are loaded. They are filled
  479. with their basic properties, like ``qid`` and ``name``.
  480. 3. In the third stage all global properties are loaded. They often
  481. reference VMs, like default netvm, so they should be filled after
  482. loading VMs.
  483. 4. In the fourth stage all remaining VM properties are loaded. They
  484. also need all VMs loaded, because they represent dependencies
  485. between VMs like aforementioned netvm.
  486. 5. In the fifth stage there are some fixups to ensure sane system
  487. operation.
  488. This class emits following events:
  489. .. event:: domain-add (subject, event, vm)
  490. When domain is added.
  491. :param subject: Event emitter
  492. :param event: Event name (``'domain-add'``)
  493. :param vm: Domain object
  494. .. event:: domain-pre-delete (subject, event, vm)
  495. When domain is deleted. VM still has reference to ``app`` object,
  496. and is contained within VMCollection. You may prevent removal by
  497. raising an exception.
  498. :param subject: Event emitter
  499. :param event: Event name (``'domain-pre-delete'``)
  500. :param vm: Domain object
  501. .. event:: domain-delete (subject, event, vm)
  502. When domain is deleted. VM still has reference to ``app`` object,
  503. but is not contained within VMCollection.
  504. :param subject: Event emitter
  505. :param event: Event name (``'domain-delete'``)
  506. :param vm: Domain object
  507. Methods and attributes:
  508. '''
  509. default_netvm = qubes.VMProperty('default_netvm', load_stage=3,
  510. default=None, allow_none=True,
  511. doc='''Default NetVM for AppVMs. Initial state is `None`, which means
  512. that AppVMs are not connected to the Internet.''')
  513. default_fw_netvm = qubes.VMProperty('default_fw_netvm', load_stage=3,
  514. default=None, allow_none=True,
  515. doc='''Default NetVM for ProxyVMs. Initial state is `None`, which means
  516. that ProxyVMs (including FirewallVM) are not connected to the
  517. Internet.''')
  518. default_template = qubes.VMProperty('default_template', load_stage=3,
  519. vmclass=qubes.vm.templatevm.TemplateVM,
  520. doc='Default template for new AppVMs')
  521. updatevm = qubes.VMProperty('updatevm', load_stage=3,
  522. allow_none=True,
  523. doc='''Which VM to use as `yum` proxy for updating AdminVM and
  524. TemplateVMs''')
  525. clockvm = qubes.VMProperty('clockvm', load_stage=3,
  526. default=None, allow_none=True,
  527. doc='Which VM to use as NTP proxy for updating AdminVM')
  528. default_kernel = qubes.property('default_kernel', load_stage=3,
  529. doc='Which kernel to use when not overriden in VM')
  530. default_dispvm = qubes.VMProperty('default_dispvm', load_stage=3,
  531. doc='Default DispVM base for service calls', allow_none=True)
  532. default_pool = qubes.property('default_pool', load_stage=3,
  533. default=_default_pool,
  534. setter=_setter_pool,
  535. doc='Default storage pool')
  536. default_pool_private = qubes.property('default_pool_private', load_stage=3,
  537. default=lambda app: app.default_pool,
  538. setter=_setter_pool,
  539. doc='Default storage pool for private volumes')
  540. default_pool_root = qubes.property('default_pool_root', load_stage=3,
  541. default=lambda app: app.default_pool,
  542. setter=_setter_pool,
  543. doc='Default storage pool for root volumes')
  544. default_pool_volatile = qubes.property('default_pool_volatile',
  545. load_stage=3,
  546. default=lambda app: app.default_pool,
  547. setter=_setter_pool,
  548. doc='Default storage pool for volatile volumes')
  549. default_pool_kernel = qubes.property('default_pool_kernel', load_stage=3,
  550. default=lambda app: app.default_pool,
  551. setter=_setter_pool,
  552. doc='Default storage pool for kernel volumes')
  553. stats_interval = qubes.property('stats_interval',
  554. default=3,
  555. type=int,
  556. doc='Interval in seconds for VM stats reporting (memory, CPU usage)')
  557. # TODO #1637 #892
  558. check_updates_vm = qubes.property('check_updates_vm',
  559. type=bool, setter=qubes.property.bool,
  560. default=True,
  561. doc='check for updates inside qubes')
  562. def __init__(self, store=None, load=True, offline_mode=None, lock=False,
  563. **kwargs):
  564. #: logger instance for logging global messages
  565. self.log = logging.getLogger('app')
  566. self.log.debug('init() -> %#x', id(self))
  567. self.log.debug('stack:')
  568. for frame in traceback.extract_stack():
  569. self.log.debug('%s', frame)
  570. self._extensions = qubes.ext.get_extensions()
  571. #: collection of all VMs managed by this Qubes instance
  572. self.domains = VMCollection(self)
  573. #: collection of all available labels for VMs
  574. self.labels = {}
  575. #: collection of all pools
  576. self.pools = {}
  577. #: Connection to VMM
  578. self.vmm = VMMConnection(offline_mode=offline_mode)
  579. #: Information about host system
  580. self.host = QubesHost(self)
  581. if store is not None:
  582. self._store = store
  583. else:
  584. self._store = os.environ.get('QUBES_XML_PATH',
  585. os.path.join(
  586. qubes.config.qubes_base_dir,
  587. qubes.config.system_path['qubes_store_filename']))
  588. super(Qubes, self).__init__(xml=None, **kwargs)
  589. self.__load_timestamp = None
  590. self.__locked_fh = None
  591. self._domain_event_callback_id = None
  592. #: jinja2 environment for libvirt XML templates
  593. self.env = jinja2.Environment(
  594. loader=jinja2.FileSystemLoader([
  595. '/etc/qubes/templates',
  596. '/usr/share/qubes/templates',
  597. ]),
  598. undefined=jinja2.StrictUndefined)
  599. if load:
  600. self.load(lock=lock)
  601. self.events_enabled = True
  602. @property
  603. def store(self):
  604. return self._store
  605. def load(self, lock=False):
  606. '''Open qubes.xml
  607. :throws EnvironmentError: failure on parsing store
  608. :throws xml.parsers.expat.ExpatError: failure on parsing store
  609. :raises lxml.etree.XMLSyntaxError: on syntax error in qubes.xml
  610. '''
  611. fh = self._acquire_lock()
  612. self.xml = lxml.etree.parse(fh)
  613. # stage 1: load labels and pools
  614. for node in self.xml.xpath('./labels/label'):
  615. label = qubes.Label.fromxml(node)
  616. self.labels[label.index] = label
  617. for node in self.xml.xpath('./pools/pool'):
  618. name = node.get('name')
  619. assert name, "Pool name '%s' is invalid " % name
  620. try:
  621. self.pools[name] = self._get_pool(**node.attrib)
  622. except qubes.exc.QubesException as e:
  623. self.log.error(str(e))
  624. # stage 2: load VMs
  625. for node in self.xml.xpath('./domains/domain'):
  626. # pylint: disable=no-member
  627. cls = self.get_vm_class(node.get('class'))
  628. vm = cls(self, node)
  629. vm.load_properties(load_stage=2)
  630. vm.init_log()
  631. self.domains.add(vm, _enable_events=False)
  632. if 0 not in self.domains:
  633. self.domains.add(
  634. qubes.vm.adminvm.AdminVM(self, None, qid=0, name='dom0'),
  635. _enable_events=False)
  636. # stage 3: load global properties
  637. self.load_properties(load_stage=3)
  638. # stage 4: fill all remaining VM properties
  639. for vm in self.domains:
  640. vm.load_properties(load_stage=4)
  641. vm.load_extras()
  642. # stage 5: misc fixups
  643. self.property_require('default_fw_netvm', allow_none=True)
  644. self.property_require('default_netvm', allow_none=True)
  645. self.property_require('default_template')
  646. self.property_require('clockvm', allow_none=True)
  647. self.property_require('updatevm', allow_none=True)
  648. for vm in self.domains:
  649. vm.events_enabled = True
  650. vm.fire_event('domain-load')
  651. # get a file timestamp (before closing it - still holding the lock!),
  652. # to detect whether anyone else have modified it in the meantime
  653. self.__load_timestamp = os.path.getmtime(self._store)
  654. if not lock:
  655. self._release_lock()
  656. def __xml__(self):
  657. element = lxml.etree.Element('qubes')
  658. element.append(self.xml_labels())
  659. pools_xml = lxml.etree.Element('pools')
  660. for pool in self.pools.values():
  661. xml = pool.__xml__()
  662. if xml is not None:
  663. pools_xml.append(xml)
  664. element.append(pools_xml)
  665. element.append(self.xml_properties())
  666. domains = lxml.etree.Element('domains')
  667. for vm in self.domains:
  668. domains.append(vm.__xml__())
  669. element.append(domains)
  670. return element
  671. def __str__(self):
  672. return type(self).__name__
  673. def save(self, lock=True):
  674. '''Save all data to qubes.xml
  675. There are several problems with saving :file:`qubes.xml` which must be
  676. mitigated:
  677. - Running out of disk space. No space left should not result in empty
  678. file. This is done by writing to temporary file and then renaming.
  679. - Attempts to write two or more files concurrently. This is done by
  680. sophisticated locking.
  681. :param bool lock: keep file locked after saving
  682. :throws EnvironmentError: failure on saving
  683. '''
  684. if not self.__locked_fh:
  685. self._acquire_lock(for_save=True)
  686. fh_new = tempfile.NamedTemporaryFile(
  687. prefix=self._store, delete=False)
  688. lxml.etree.ElementTree(self.__xml__()).write(
  689. fh_new, encoding='utf-8', pretty_print=True)
  690. fh_new.flush()
  691. try:
  692. os.chown(fh_new.name, -1, grp.getgrnam('qubes').gr_gid)
  693. os.chmod(fh_new.name, 0o660)
  694. except KeyError: # group 'qubes' not found
  695. # don't change mode if no 'qubes' group in the system
  696. pass
  697. os.rename(fh_new.name, self._store)
  698. # update stored mtime, in case of multiple save() calls without
  699. # loading qubes.xml again
  700. self.__load_timestamp = os.path.getmtime(self._store)
  701. # this releases lock for all other processes,
  702. # but they should instantly block on the new descriptor
  703. self.__locked_fh.close()
  704. self.__locked_fh = fh_new
  705. if not lock:
  706. self._release_lock()
  707. def close(self):
  708. '''Deconstruct the object and break circular references
  709. After calling this the object is unusable, not even for saving.'''
  710. self.log.debug('close() <- %#x', id(self))
  711. for frame in traceback.extract_stack():
  712. self.log.debug('%s', frame)
  713. super().close()
  714. if self._domain_event_callback_id is not None:
  715. self.vmm.libvirt_conn.domainEventDeregisterAny(
  716. self._domain_event_callback_id)
  717. self._domain_event_callback_id = None
  718. # Only our Lord, The God Almighty, knows what references
  719. # are kept in extensions.
  720. del self._extensions
  721. for vm in self.domains:
  722. vm.close()
  723. self.domains.close()
  724. del self.domains
  725. self.vmm.close()
  726. del self.vmm
  727. del self.host
  728. if self.__locked_fh:
  729. self._release_lock()
  730. def _acquire_lock(self, for_save=False):
  731. assert self.__locked_fh is None, 'double lock'
  732. while True:
  733. try:
  734. fd = os.open(self._store,
  735. os.O_RDWR | (os.O_CREAT * int(for_save)))
  736. except OSError as e:
  737. if not for_save and e.errno == errno.ENOENT:
  738. raise qubes.exc.QubesException(
  739. 'Qubes XML store {!r} is missing; '
  740. 'use qubes-create tool'.format(self._store))
  741. raise
  742. # While we were waiting for lock, someone could have unlink()ed
  743. # (or rename()d) our file out of the filesystem. We have to
  744. # ensure we got lock on something linked to filesystem.
  745. # If not, try again.
  746. if os.fstat(fd) != os.stat(self._store):
  747. os.close(fd)
  748. continue
  749. if self.__load_timestamp and \
  750. os.path.getmtime(self._store) != self.__load_timestamp:
  751. os.close(fd)
  752. raise qubes.exc.QubesException(
  753. 'Someone else modified qubes.xml in the meantime')
  754. break
  755. if os.name == 'posix':
  756. fcntl.lockf(fd, fcntl.LOCK_EX)
  757. elif os.name == 'nt':
  758. # pylint: disable=protected-access
  759. overlapped = pywintypes.OVERLAPPED()
  760. win32file.LockFileEx(
  761. win32file._get_osfhandle(fd),
  762. win32con.LOCKFILE_EXCLUSIVE_LOCK, 0, -0x10000, overlapped)
  763. self.__locked_fh = os.fdopen(fd, 'r+b')
  764. return self.__locked_fh
  765. def _release_lock(self):
  766. assert self.__locked_fh is not None, 'double release'
  767. # intentionally do not call explicit unlock to not unlock the file
  768. # before all buffers are flushed
  769. self.__locked_fh.close()
  770. self.__locked_fh = None
  771. def load_initial_values(self):
  772. self.labels = {
  773. 1: qubes.Label(1, '0xcc0000', 'red'),
  774. 2: qubes.Label(2, '0xf57900', 'orange'),
  775. 3: qubes.Label(3, '0xedd400', 'yellow'),
  776. 4: qubes.Label(4, '0x73d216', 'green'),
  777. 5: qubes.Label(5, '0x555753', 'gray'),
  778. 6: qubes.Label(6, '0x3465a4', 'blue'),
  779. 7: qubes.Label(7, '0x75507b', 'purple'),
  780. 8: qubes.Label(8, '0x000000', 'black'),
  781. }
  782. assert max(self.labels.keys()) == qubes.config.max_default_label
  783. # check if the default LVM Thin pool qubes_dom0/pool00 exists
  784. if os.path.exists('/dev/mapper/qubes_dom0-pool00-tpool'):
  785. self.add_pool(volume_group='qubes_dom0', thin_pool='pool00',
  786. name='lvm', driver='lvm_thin')
  787. # pool based on /var/lib/qubes will be created here:
  788. for name, config in qubes.config.defaults['pool_configs'].items():
  789. self.pools[name] = self._get_pool(**config)
  790. self.default_pool_kernel = 'linux-kernel'
  791. self.domains.add(
  792. qubes.vm.adminvm.AdminVM(self, None, label='black'))
  793. @classmethod
  794. def create_empty_store(cls, *args, **kwargs):
  795. self = cls(*args, load=False, **kwargs)
  796. if os.path.exists(self.store):
  797. raise qubes.exc.QubesException(
  798. '{} already exists, aborting'.format(self.store))
  799. self.load_initial_values()
  800. # TODO py3 get lock= as keyword-only arg
  801. self.save(kwargs.get('lock'))
  802. return self
  803. def xml_labels(self):
  804. '''Serialise labels
  805. :rtype: lxml.etree._Element
  806. '''
  807. labels = lxml.etree.Element('labels')
  808. for label in sorted(self.labels.values(), key=lambda labl: labl.index):
  809. labels.append(label.__xml__())
  810. return labels
  811. @staticmethod
  812. def get_vm_class(clsname):
  813. '''Find the class for a domain.
  814. Classes are registered as setuptools' entry points in ``qubes.vm``
  815. group. Any package may supply their own classes.
  816. :param str clsname: name of the class
  817. :return type: class
  818. '''
  819. try:
  820. return qubes.utils.get_entry_point_one(
  821. qubes.vm.VM_ENTRY_POINT, clsname)
  822. except KeyError:
  823. raise qubes.exc.QubesException(
  824. 'no such VM class: {!r}'.format(clsname))
  825. # don't catch TypeError
  826. def add_new_vm(self, cls, qid=None, **kwargs):
  827. '''Add new Virtual Machine to collection
  828. '''
  829. if qid is None:
  830. qid = self.domains.get_new_unused_qid()
  831. if isinstance(cls, str):
  832. cls = self.get_vm_class(cls)
  833. # handle default template; specifically allow template=None (do not
  834. # override it with default template)
  835. if 'template' not in kwargs and hasattr(cls, 'template'):
  836. kwargs['template'] = self.default_template
  837. elif 'template' in kwargs and isinstance(kwargs['template'], str):
  838. kwargs['template'] = self.domains[kwargs['template']]
  839. return self.domains.add(cls(self, None, qid=qid, **kwargs))
  840. def get_label(self, label):
  841. '''Get label as identified by index or name
  842. :throws KeyError: when label is not found
  843. '''
  844. # first search for index, verbatim
  845. try:
  846. return self.labels[label]
  847. except KeyError:
  848. pass
  849. # then search for name
  850. for i in self.labels.values():
  851. if i.name == label:
  852. return i
  853. # last call, if label is a number represented as str, search in indices
  854. try:
  855. return self.labels[int(label)]
  856. except (KeyError, ValueError):
  857. pass
  858. raise KeyError(label)
  859. def add_pool(self, name, **kwargs):
  860. """ Add a storage pool to config."""
  861. if name in self.pools.keys():
  862. raise qubes.exc.QubesException('pool named %s already exists \n' %
  863. name)
  864. kwargs['name'] = name
  865. pool = self._get_pool(**kwargs)
  866. pool.setup()
  867. self.pools[name] = pool
  868. return pool
  869. def remove_pool(self, name):
  870. """ Remove a storage pool from config file. """
  871. try:
  872. pool = self.pools[name]
  873. del self.pools[name]
  874. pool.destroy()
  875. except KeyError:
  876. return
  877. def get_pool(self, pool):
  878. ''' Returns a :py:class:`qubes.storage.Pool` instance '''
  879. if isinstance(pool, qubes.storage.Pool):
  880. return pool
  881. try:
  882. return self.pools[pool]
  883. except KeyError:
  884. raise qubes.exc.QubesException('Unknown storage pool ' + pool)
  885. @staticmethod
  886. def _get_pool(**kwargs):
  887. try:
  888. name = kwargs['name']
  889. assert name, 'Name needs to be an non empty string'
  890. except KeyError:
  891. raise qubes.exc.QubesException('No pool name for pool')
  892. try:
  893. driver = kwargs['driver']
  894. except KeyError:
  895. raise qubes.exc.QubesException('No driver specified for pool ' +
  896. name)
  897. try:
  898. klass = qubes.utils.get_entry_point_one(
  899. qubes.storage.STORAGE_ENTRY_POINT, driver)
  900. del kwargs['driver']
  901. return klass(**kwargs)
  902. except KeyError:
  903. raise qubes.exc.QubesException('No driver %s for pool %s' %
  904. (driver, name))
  905. def register_event_handlers(self):
  906. '''Register libvirt event handlers, which will translate libvirt
  907. events into qubes.events. This function should be called only in
  908. 'qubesd' process and only when mainloop has been already set.
  909. '''
  910. self._domain_event_callback_id = (
  911. self.vmm.libvirt_conn.domainEventRegisterAny(
  912. None, # any domain
  913. libvirt.VIR_DOMAIN_EVENT_ID_LIFECYCLE,
  914. self._domain_event_callback,
  915. None))
  916. def _domain_event_callback(self, _conn, domain, event, _detail, _opaque):
  917. '''Generic libvirt event handler (virConnectDomainEventCallback),
  918. translate libvirt event into qubes.events.
  919. '''
  920. if not self.events_enabled:
  921. return
  922. try:
  923. vm = self.domains[domain.name()]
  924. except KeyError:
  925. # ignore events for unknown domains
  926. return
  927. if event == libvirt.VIR_DOMAIN_EVENT_STOPPED:
  928. vm.fire_event('domain-shutdown')
  929. @qubes.events.handler('domain-pre-delete')
  930. def on_domain_pre_deleted(self, event, vm):
  931. # pylint: disable=unused-argument
  932. for obj in itertools.chain(self.domains, (self,)):
  933. for prop in obj.property_list():
  934. try:
  935. if isinstance(prop, qubes.vm.VMProperty) and \
  936. getattr(obj, prop.__name__) == vm:
  937. self.log.error(
  938. 'Cannot remove %s, used by %s.%s',
  939. vm, obj, prop.__name__)
  940. raise qubes.exc.QubesVMInUseError(vm)
  941. except AttributeError:
  942. pass
  943. @qubes.events.handler('domain-delete')
  944. def on_domain_deleted(self, event, vm):
  945. # pylint: disable=unused-argument
  946. for propname in (
  947. 'default_netvm',
  948. 'default_fw_netvm',
  949. 'clockvm',
  950. 'updatevm',
  951. 'default_template',
  952. ):
  953. try:
  954. if getattr(self, propname) == vm:
  955. delattr(self, propname)
  956. except AttributeError:
  957. pass
  958. @qubes.events.handler('property-pre-set:clockvm')
  959. def on_property_pre_set_clockvm(self, event, name, newvalue, oldvalue=None):
  960. # pylint: disable=unused-argument,no-self-use
  961. if newvalue is None:
  962. return
  963. if 'service.clocksync' not in newvalue.features:
  964. newvalue.features['service.clocksync'] = True
  965. @qubes.events.handler('property-set:clockvm')
  966. def on_property_set_clockvm(self, event, name, newvalue, oldvalue=None):
  967. # pylint: disable=unused-argument,no-self-use
  968. if oldvalue and oldvalue.features.get('service.clocksync', False):
  969. del oldvalue.features['service.clocksync']
  970. @qubes.events.handler(
  971. 'property-pre-set:default_netvm',
  972. 'property-pre-set:default_fw_netvm')
  973. def on_property_pre_set_default_netvm(self, event, name, newvalue,
  974. oldvalue=None):
  975. # pylint: disable=unused-argument,invalid-name
  976. if newvalue is not None and oldvalue is not None \
  977. and oldvalue.is_running() and not newvalue.is_running() \
  978. and self.domains.get_vms_connected_to(oldvalue):
  979. raise qubes.exc.QubesVMNotRunningError(newvalue,
  980. 'Cannot change {!r} to domain that '
  981. 'is not running ({!r}).'.format(name, newvalue.name))
  982. @qubes.events.handler('property-set:default_fw_netvm')
  983. def on_property_set_default_fw_netvm(self, event, name, newvalue,
  984. oldvalue=None):
  985. # pylint: disable=unused-argument,invalid-name
  986. for vm in self.domains:
  987. if not vm.provides_network and vm.property_is_default('netvm'):
  988. # fire property-del:netvm as it is responsible for resetting
  989. # netvm to it's default value
  990. vm.fire_event('property-del:netvm',
  991. name='netvm', newvalue=newvalue, oldvalue=oldvalue)
  992. @qubes.events.handler('property-set:default_netvm')
  993. def on_property_set_default_netvm(self, event, name, newvalue,
  994. oldvalue=None):
  995. # pylint: disable=unused-argument
  996. for vm in self.domains:
  997. if hasattr(vm, 'netvm') and vm.property_is_default('netvm'):
  998. # fire property-del:netvm as it is responsible for resetting
  999. # netvm to it's default value
  1000. vm.fire_event('property-del:netvm',
  1001. name='netvm', oldvalue=oldvalue)