app.py 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131
  1. #
  2. # The Qubes OS Project, https://www.qubes-os.org/
  3. #
  4. # Copyright (C) 2010-2015 Joanna Rutkowska <joanna@invisiblethingslab.com>
  5. # Copyright (C) 2011-2015 Marek Marczykowski-Górecki
  6. # <marmarek@invisiblethingslab.com>
  7. # Copyright (C) 2014-2015 Wojtek Porczyk <woju@invisiblethingslab.com>
  8. #
  9. # This program is free software; you can redistribute it and/or modify
  10. # it under the terms of the GNU General Public License as published by
  11. # the Free Software Foundation; either version 2 of the License, or
  12. # (at your option) any later version.
  13. #
  14. # This program is distributed in the hope that it will be useful,
  15. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. # GNU General Public License for more details.
  18. #
  19. # You should have received a copy of the GNU General Public License along
  20. # with this program; if not, write to the Free Software Foundation, Inc.,
  21. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  22. #
  23. import collections
  24. import errno
  25. import functools
  26. import grp
  27. import logging
  28. import os
  29. import random
  30. import sys
  31. import tempfile
  32. import time
  33. import uuid
  34. import lxml.etree
  35. import jinja2
  36. import libvirt
  37. try:
  38. import xen.lowlevel.xs # pylint: disable=wrong-import-order
  39. import xen.lowlevel.xc # pylint: disable=wrong-import-order
  40. except ImportError:
  41. pass
  42. if os.name == 'posix':
  43. # pylint: disable=wrong-import-order
  44. import fcntl
  45. elif os.name == 'nt':
  46. # pylint: disable=import-error
  47. import win32con
  48. import win32file
  49. import pywintypes
  50. else:
  51. raise RuntimeError("Qubes works only on POSIX or WinNT systems")
  52. # pylint: disable=wrong-import-position
  53. import qubes
  54. import qubes.ext
  55. import qubes.utils
  56. import qubes.storage
  57. import qubes.vm
  58. import qubes.vm.adminvm
  59. import qubes.vm.qubesvm
  60. import qubes.vm.templatevm
  61. # pylint: enable=wrong-import-position
  62. class VirDomainWrapper(object):
  63. # pylint: disable=too-few-public-methods
  64. def __init__(self, connection, vm):
  65. self._connection = connection
  66. self._vm = vm
  67. def _reconnect_if_dead(self):
  68. is_dead = not self._vm.connect().isAlive()
  69. if is_dead:
  70. # pylint: disable=protected-access
  71. self._connection._reconnect_if_dead()
  72. self._vm = self._connection._conn.lookupByUUID(self._vm.UUID())
  73. return is_dead
  74. def __getattr__(self, attrname):
  75. attr = getattr(self._vm, attrname)
  76. if not isinstance(attr, collections.Callable):
  77. return attr
  78. @functools.wraps(attr)
  79. def wrapper(*args, **kwargs):
  80. try:
  81. return attr(*args, **kwargs)
  82. except libvirt.libvirtError:
  83. if self._reconnect_if_dead():
  84. return getattr(self._vm, attrname)(*args, **kwargs)
  85. raise
  86. return wrapper
  87. class VirConnectWrapper(object):
  88. # pylint: disable=too-few-public-methods
  89. def __init__(self, uri):
  90. self._conn = libvirt.open(uri)
  91. def _reconnect_if_dead(self):
  92. is_dead = not self._conn.isAlive()
  93. if is_dead:
  94. self._conn = libvirt.open(self._conn.getURI())
  95. # TODO: re-register event handlers
  96. return is_dead
  97. def _wrap_domain(self, ret):
  98. if isinstance(ret, libvirt.virDomain):
  99. ret = VirDomainWrapper(self, ret)
  100. return ret
  101. def __getattr__(self, attrname):
  102. attr = getattr(self._conn, attrname)
  103. if not isinstance(attr, collections.Callable):
  104. return attr
  105. @functools.wraps(attr)
  106. def wrapper(*args, **kwargs):
  107. try:
  108. return self._wrap_domain(attr(*args, **kwargs))
  109. except libvirt.libvirtError:
  110. if self._reconnect_if_dead():
  111. return self._wrap_domain(
  112. getattr(self._conn, attrname)(*args, **kwargs))
  113. raise
  114. return wrapper
  115. class VMMConnection(object):
  116. '''Connection to Virtual Machine Manager (libvirt)'''
  117. def __init__(self, offline_mode=None):
  118. '''
  119. :param offline_mode: enable/disable offline mode; default is to
  120. enable when running in chroot as root, otherwise disable
  121. '''
  122. self._libvirt_conn = None
  123. self._xs = None
  124. self._xc = None
  125. if offline_mode is None:
  126. offline_mode = bool(os.getuid() == 0 and
  127. os.stat('/') != os.stat('/proc/1/root/.'))
  128. self._offline_mode = offline_mode
  129. @property
  130. def offline_mode(self):
  131. '''Check or enable offline mode (do not actually connect to vmm)'''
  132. return self._offline_mode
  133. def _libvirt_error_handler(self, ctx, error):
  134. pass
  135. def init_vmm_connection(self):
  136. '''Initialise connection
  137. This method is automatically called when getting'''
  138. if self._libvirt_conn is not None:
  139. # Already initialized
  140. return
  141. if self._offline_mode:
  142. # Do not initialize in offline mode
  143. raise qubes.exc.QubesException(
  144. 'VMM operations disabled in offline mode')
  145. if 'xen.lowlevel.xs' in sys.modules:
  146. self._xs = xen.lowlevel.xs.xs()
  147. if 'xen.lowlevel.cs' in sys.modules:
  148. self._xc = xen.lowlevel.xc.xc()
  149. self._libvirt_conn = VirConnectWrapper(
  150. qubes.config.defaults['libvirt_uri'])
  151. libvirt.registerErrorHandler(self._libvirt_error_handler, None)
  152. @property
  153. def libvirt_conn(self):
  154. '''Connection to libvirt'''
  155. self.init_vmm_connection()
  156. return self._libvirt_conn
  157. @property
  158. def xs(self):
  159. '''Connection to Xen Store
  160. This property in available only when running on Xen.
  161. '''
  162. # XXX what about the case when we run under KVM,
  163. # but xen modules are importable?
  164. if 'xen.lowlevel.xs' not in sys.modules:
  165. raise AttributeError(
  166. 'xs object is available under Xen hypervisor only')
  167. self.init_vmm_connection()
  168. return self._xs
  169. @property
  170. def xc(self):
  171. '''Connection to Xen
  172. This property in available only when running on Xen.
  173. '''
  174. # XXX what about the case when we run under KVM,
  175. # but xen modules are importable?
  176. if 'xen.lowlevel.xc' not in sys.modules:
  177. raise AttributeError(
  178. 'xc object is available under Xen hypervisor only')
  179. self.init_vmm_connection()
  180. return self._xs
  181. def register_event_handlers(self, app):
  182. '''Register libvirt event handlers, which will translate libvirt
  183. events into qubes.events. This function should be called only in
  184. 'qubesd' process and only when mainloop has been already set.
  185. '''
  186. self.libvirt_conn.domainEventRegisterAny(
  187. None, # any domain
  188. libvirt.VIR_DOMAIN_EVENT_ID_LIFECYCLE,
  189. self._domain_event_callback,
  190. app
  191. )
  192. @staticmethod
  193. def _domain_event_callback(_conn, domain, event, _detail, opaque):
  194. '''Generic libvirt event handler (virConnectDomainEventCallback),
  195. translate libvirt event into qubes.events.
  196. '''
  197. app = opaque
  198. try:
  199. vm = app.domains[domain.name()]
  200. except KeyError:
  201. # ignore events for unknown domains
  202. return
  203. if event == libvirt.VIR_DOMAIN_EVENT_STOPPED:
  204. vm.fire_event('domain-shutdown')
  205. def __del__(self):
  206. if self._libvirt_conn:
  207. self._libvirt_conn.close()
  208. class QubesHost(object):
  209. '''Basic information about host machine
  210. :param qubes.Qubes app: Qubes application context (must have \
  211. :py:attr:`Qubes.vmm` attribute defined)
  212. '''
  213. def __init__(self, app):
  214. self.app = app
  215. self._no_cpus = None
  216. self._total_mem = None
  217. self._physinfo = None
  218. def _fetch(self):
  219. if self._no_cpus is not None:
  220. return
  221. # pylint: disable=unused-variable
  222. (model, memory, cpus, mhz, nodes, socket, cores, threads) = \
  223. self.app.vmm.libvirt_conn.getInfo()
  224. self._total_mem = int(memory) * 1024
  225. self._no_cpus = cpus
  226. self.app.log.debug('QubesHost: no_cpus={} memory_total={}'.format(
  227. self.no_cpus, self.memory_total))
  228. try:
  229. self.app.log.debug('QubesHost: xen_free_memory={}'.format(
  230. self.get_free_xen_memory()))
  231. except NotImplementedError:
  232. pass
  233. @property
  234. def memory_total(self):
  235. '''Total memory, in kbytes'''
  236. if self.app.vmm.offline_mode:
  237. return 2**64-1
  238. self._fetch()
  239. return self._total_mem
  240. @property
  241. def no_cpus(self):
  242. '''Number of CPUs'''
  243. if self.app.vmm.offline_mode:
  244. return 42
  245. self._fetch()
  246. return self._no_cpus
  247. def get_free_xen_memory(self):
  248. '''Get free memory from Xen's physinfo.
  249. :raises NotImplementedError: when not under Xen
  250. '''
  251. try:
  252. self._physinfo = self.app.xc.physinfo()
  253. except AttributeError:
  254. raise NotImplementedError('This function requires Xen hypervisor')
  255. return int(self._physinfo['free_memory'])
  256. def measure_cpu_usage(self, previous_time=None, previous=None,
  257. wait_time=1):
  258. '''Measure cpu usage for all domains at once.
  259. This function requires Xen hypervisor.
  260. .. versionchanged:: 3.0
  261. argument order to match return tuple
  262. :raises NotImplementedError: when not under Xen
  263. '''
  264. if previous is None:
  265. previous_time = time.time()
  266. previous = {}
  267. try:
  268. info = self.app.vmm.xc.domain_getinfo(0, qubes.config.max_qid)
  269. except AttributeError:
  270. raise NotImplementedError(
  271. 'This function requires Xen hypervisor')
  272. for vm in info:
  273. previous[vm['domid']] = {}
  274. previous[vm['domid']]['cpu_time'] = (
  275. vm['cpu_time'] / max(vm['online_vcpus'], 1))
  276. previous[vm['domid']]['cpu_usage'] = 0
  277. time.sleep(wait_time)
  278. current_time = time.time()
  279. current = {}
  280. try:
  281. info = self.app.vmm.xc.domain_getinfo(0, qubes.config.max_qid)
  282. except AttributeError:
  283. raise NotImplementedError(
  284. 'This function requires Xen hypervisor')
  285. for vm in info:
  286. current[vm['domid']] = {}
  287. current[vm['domid']]['cpu_time'] = (
  288. vm['cpu_time'] / max(vm['online_vcpus'], 1))
  289. if vm['domid'] in previous.keys():
  290. current[vm['domid']]['cpu_usage'] = (
  291. float(current[vm['domid']]['cpu_time'] -
  292. previous[vm['domid']]['cpu_time']) /
  293. 1000 ** 3 / (current_time - previous_time) * 100)
  294. if current[vm['domid']]['cpu_usage'] < 0:
  295. # VM has been rebooted
  296. current[vm['domid']]['cpu_usage'] = 0
  297. else:
  298. current[vm['domid']]['cpu_usage'] = 0
  299. return (current_time, current)
  300. class VMCollection(object):
  301. '''A collection of Qubes VMs
  302. VMCollection supports ``in`` operator. You may test for ``qid``, ``name``
  303. and whole VM object's presence.
  304. Iterating over VMCollection will yield machine objects.
  305. '''
  306. def __init__(self, app):
  307. self.app = app
  308. self._dict = dict()
  309. def __repr__(self):
  310. return '<{} {!r}>'.format(
  311. self.__class__.__name__, list(sorted(self.keys())))
  312. def items(self):
  313. '''Iterate over ``(qid, vm)`` pairs'''
  314. for qid in self.qids():
  315. yield (qid, self[qid])
  316. def qids(self):
  317. '''Iterate over all qids
  318. qids are sorted by numerical order.
  319. '''
  320. return iter(sorted(self._dict.keys()))
  321. keys = qids
  322. def names(self):
  323. '''Iterate over all names
  324. names are sorted by lexical order.
  325. '''
  326. return iter(sorted(vm.name for vm in self._dict.values()))
  327. def vms(self):
  328. '''Iterate over all machines
  329. vms are sorted by qid.
  330. '''
  331. return iter(sorted(self._dict.values()))
  332. __iter__ = vms
  333. values = vms
  334. def add(self, value, _enable_events=True):
  335. '''Add VM to collection
  336. :param qubes.vm.BaseVM value: VM to add
  337. :raises TypeError: when value is of wrong type
  338. :raises ValueError: when there is already VM which has equal ``qid``
  339. '''
  340. # this violates duck typing, but is needed
  341. # for VMProperty to function correctly
  342. if not isinstance(value, qubes.vm.BaseVM):
  343. raise TypeError('{} holds only BaseVM instances'.format(
  344. self.__class__.__name__))
  345. if value.qid in self:
  346. raise ValueError('This collection already holds VM that has '
  347. 'qid={!r} ({!r})'.format(value.qid, self[value.qid]))
  348. if value.name in self:
  349. raise ValueError('A VM named {!s} already exists'
  350. .format(value.name))
  351. self._dict[value.qid] = value
  352. if _enable_events:
  353. value.events_enabled = True
  354. self.app.fire_event('domain-add', vm=value)
  355. return value
  356. def __getitem__(self, key):
  357. if isinstance(key, int):
  358. return self._dict[key]
  359. if isinstance(key, str):
  360. for vm in self:
  361. if vm.name == key:
  362. return vm
  363. raise KeyError(key)
  364. if isinstance(key, qubes.vm.BaseVM):
  365. key = key.uuid
  366. if isinstance(key, uuid.UUID):
  367. for vm in self:
  368. if vm.uuid == key:
  369. return vm
  370. raise KeyError(key)
  371. raise KeyError(key)
  372. def __delitem__(self, key):
  373. vm = self[key]
  374. if not vm.is_halted():
  375. raise qubes.exc.QubesVMNotHaltedError(vm)
  376. self.app.fire_event('domain-pre-delete', pre_event=True, vm=vm)
  377. try:
  378. vm.libvirt_domain.undefine()
  379. except libvirt.libvirtError as e:
  380. if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
  381. # already undefined
  382. pass
  383. del self._dict[vm.qid]
  384. self.app.fire_event('domain-delete', vm=vm)
  385. def __contains__(self, key):
  386. return any((key == vm or key == vm.qid or key == vm.name)
  387. for vm in self)
  388. def __len__(self):
  389. return len(self._dict)
  390. def get_vms_based_on(self, template):
  391. template = self[template]
  392. return set(vm for vm in self
  393. if hasattr(vm, 'template') and vm.template == template)
  394. def get_vms_connected_to(self, netvm):
  395. new_vms = set([self[netvm]])
  396. dependent_vms = set()
  397. # Dependency resolving only makes sense on NetVM (or derivative)
  398. # if not self[netvm_qid].is_netvm():
  399. # return set([])
  400. while new_vms:
  401. cur_vm = new_vms.pop()
  402. for vm in cur_vm.connected_vms:
  403. if vm in dependent_vms:
  404. continue
  405. dependent_vms.add(vm)
  406. # if vm.is_netvm():
  407. new_vms.add(vm)
  408. return dependent_vms
  409. # XXX with Qubes Admin Api this will probably lead to race condition
  410. # whole process of creating and adding should be synchronised
  411. def get_new_unused_qid(self):
  412. used_ids = set(self.qids())
  413. for i in range(1, qubes.config.max_qid):
  414. if i not in used_ids:
  415. return i
  416. raise LookupError("Cannot find unused qid!")
  417. def get_new_unused_netid(self):
  418. used_ids = set([vm.netid for vm in self]) # if vm.is_netvm()])
  419. for i in range(1, qubes.config.max_netid):
  420. if i not in used_ids:
  421. return i
  422. raise LookupError("Cannot find unused netid!")
  423. def get_new_unused_dispid(self):
  424. for _ in range(int(qubes.config.max_dispid ** 0.5)):
  425. dispid = random.SystemRandom().randrange(qubes.config.max_dispid)
  426. if not any(getattr(vm, 'dispid', None) == dispid for vm in self):
  427. return dispid
  428. raise LookupError((
  429. 'https://xkcd.com/221/',
  430. 'http://dilbert.com/strip/2001-10-25')[random.randint(0, 1)])
  431. class Qubes(qubes.PropertyHolder):
  432. '''Main Qubes application
  433. :param str store: path to ``qubes.xml``
  434. The store is loaded in stages:
  435. 1. In the first stage there are loaded some basic features from store
  436. (currently labels).
  437. 2. In the second stage stubs for all VMs are loaded. They are filled
  438. with their basic properties, like ``qid`` and ``name``.
  439. 3. In the third stage all global properties are loaded. They often
  440. reference VMs, like default netvm, so they should be filled after
  441. loading VMs.
  442. 4. In the fourth stage all remaining VM properties are loaded. They
  443. also need all VMs loaded, because they represent dependencies
  444. between VMs like aforementioned netvm.
  445. 5. In the fifth stage there are some fixups to ensure sane system
  446. operation.
  447. This class emits following events:
  448. .. event:: domain-add (subject, event, vm)
  449. When domain is added.
  450. :param subject: Event emitter
  451. :param event: Event name (``'domain-add'``)
  452. :param vm: Domain object
  453. .. event:: domain-pre-delete (subject, event, vm)
  454. When domain is deleted. VM still has reference to ``app`` object,
  455. and is contained within VMCollection. You may prevent removal by
  456. raising an exception.
  457. :param subject: Event emitter
  458. :param event: Event name (``'domain-pre-delete'``)
  459. :param vm: Domain object
  460. .. event:: domain-delete (subject, event, vm)
  461. When domain is deleted. VM still has reference to ``app`` object,
  462. but is not contained within VMCollection.
  463. :param subject: Event emitter
  464. :param event: Event name (``'domain-delete'``)
  465. :param vm: Domain object
  466. Methods and attributes:
  467. '''
  468. default_netvm = qubes.VMProperty('default_netvm', load_stage=3,
  469. default=None, allow_none=True,
  470. doc='''Default NetVM for AppVMs. Initial state is `None`, which means
  471. that AppVMs are not connected to the Internet.''')
  472. default_fw_netvm = qubes.VMProperty('default_fw_netvm', load_stage=3,
  473. default=None, allow_none=True,
  474. doc='''Default NetVM for ProxyVMs. Initial state is `None`, which means
  475. that ProxyVMs (including FirewallVM) are not connected to the
  476. Internet.''')
  477. default_template = qubes.VMProperty('default_template', load_stage=3,
  478. vmclass=qubes.vm.templatevm.TemplateVM,
  479. doc='Default template for new AppVMs')
  480. updatevm = qubes.VMProperty('updatevm', load_stage=3,
  481. allow_none=True,
  482. doc='''Which VM to use as `yum` proxy for updating AdminVM and
  483. TemplateVMs''')
  484. clockvm = qubes.VMProperty('clockvm', load_stage=3,
  485. allow_none=True,
  486. doc='Which VM to use as NTP proxy for updating AdminVM')
  487. default_kernel = qubes.property('default_kernel', load_stage=3,
  488. doc='Which kernel to use when not overriden in VM')
  489. default_dispvm = qubes.VMProperty('default_dispvm', load_stage=3,
  490. doc='Default DispVM base for service calls')
  491. # TODO #1637 #892
  492. check_updates_vm = qubes.property('check_updates_vm',
  493. type=bool, setter=qubes.property.bool,
  494. default=True,
  495. doc='check for updates inside qubes')
  496. def __init__(self, store=None, load=True, offline_mode=None, lock=False,
  497. **kwargs):
  498. #: logger instance for logging global messages
  499. self.log = logging.getLogger('app')
  500. self._extensions = qubes.ext.get_extensions()
  501. #: collection of all VMs managed by this Qubes instance
  502. self.domains = VMCollection(self)
  503. #: collection of all available labels for VMs
  504. self.labels = {}
  505. #: collection of all pools
  506. self.pools = {}
  507. #: Connection to VMM
  508. self.vmm = VMMConnection(offline_mode=offline_mode)
  509. #: Information about host system
  510. self.host = QubesHost(self)
  511. if store is not None:
  512. self._store = store
  513. else:
  514. self._store = os.environ.get('QUBES_XML_PATH',
  515. os.path.join(
  516. qubes.config.system_path['qubes_base_dir'],
  517. qubes.config.system_path['qubes_store_filename']))
  518. super(Qubes, self).__init__(xml=None, **kwargs)
  519. self.__load_timestamp = None
  520. self.__locked_fh = None
  521. #: jinja2 environment for libvirt XML templates
  522. self.env = jinja2.Environment(
  523. loader=jinja2.FileSystemLoader([
  524. '/etc/qubes/templates',
  525. '/usr/share/qubes/templates',
  526. ]),
  527. undefined=jinja2.StrictUndefined)
  528. if load:
  529. self.load(lock=lock)
  530. self.events_enabled = True
  531. @property
  532. def store(self):
  533. return self._store
  534. def load(self, lock=False):
  535. '''Open qubes.xml
  536. :throws EnvironmentError: failure on parsing store
  537. :throws xml.parsers.expat.ExpatError: failure on parsing store
  538. :raises lxml.etree.XMLSyntaxError: on syntax error in qubes.xml
  539. '''
  540. fh = self._acquire_lock()
  541. self.xml = lxml.etree.parse(fh)
  542. # stage 1: load labels and pools
  543. for node in self.xml.xpath('./labels/label'):
  544. label = qubes.Label.fromxml(node)
  545. self.labels[label.index] = label
  546. for node in self.xml.xpath('./pools/pool'):
  547. name = node.get('name')
  548. assert name, "Pool name '%s' is invalid " % name
  549. try:
  550. self.pools[name] = self._get_pool(**node.attrib)
  551. except qubes.exc.QubesException as e:
  552. self.log.error(str(e))
  553. # stage 2: load VMs
  554. for node in self.xml.xpath('./domains/domain'):
  555. # pylint: disable=no-member
  556. cls = self.get_vm_class(node.get('class'))
  557. vm = cls(self, node)
  558. vm.load_properties(load_stage=2)
  559. vm.init_log()
  560. self.domains.add(vm, _enable_events=False)
  561. if 0 not in self.domains:
  562. self.domains.add(
  563. qubes.vm.adminvm.AdminVM(self, None, qid=0, name='dom0'),
  564. _enable_events=False)
  565. # stage 3: load global properties
  566. self.load_properties(load_stage=3)
  567. # stage 4: fill all remaining VM properties
  568. for vm in self.domains:
  569. vm.load_properties(load_stage=4)
  570. vm.load_extras()
  571. # stage 5: misc fixups
  572. self.property_require('default_fw_netvm', allow_none=True)
  573. self.property_require('default_netvm', allow_none=True)
  574. self.property_require('default_template')
  575. self.property_require('clockvm', allow_none=True)
  576. self.property_require('updatevm', allow_none=True)
  577. # Disable ntpd in ClockVM - to not conflict with ntpdate (both are
  578. # using 123/udp port)
  579. if hasattr(self, 'clockvm') and self.clockvm is not None:
  580. if self.clockvm.features.get('service/ntpd', False):
  581. self.log.warning(
  582. 'VM set as clockvm (%r) has enabled \'ntpd\' service! '
  583. 'Expect failure when syncing time in dom0.',
  584. self.clockvm)
  585. else:
  586. self.clockvm.features['service/ntpd'] = ''
  587. for vm in self.domains:
  588. vm.events_enabled = True
  589. vm.fire_event('domain-load')
  590. # get a file timestamp (before closing it - still holding the lock!),
  591. # to detect whether anyone else have modified it in the meantime
  592. self.__load_timestamp = os.path.getmtime(self._store)
  593. if not lock:
  594. self._release_lock()
  595. def __xml__(self):
  596. element = lxml.etree.Element('qubes')
  597. element.append(self.xml_labels())
  598. pools_xml = lxml.etree.Element('pools')
  599. for pool in self.pools.values():
  600. xml = pool.__xml__()
  601. if xml is not None:
  602. pools_xml.append(xml)
  603. element.append(pools_xml)
  604. element.append(self.xml_properties())
  605. domains = lxml.etree.Element('domains')
  606. for vm in self.domains:
  607. domains.append(vm.__xml__())
  608. element.append(domains)
  609. return element
  610. def save(self, lock=True):
  611. '''Save all data to qubes.xml
  612. There are several problems with saving :file:`qubes.xml` which must be
  613. mitigated:
  614. - Running out of disk space. No space left should not result in empty
  615. file. This is done by writing to temporary file and then renaming.
  616. - Attempts to write two or more files concurrently. This is done by
  617. sophisticated locking.
  618. :param bool lock: keep file locked after saving
  619. :throws EnvironmentError: failure on saving
  620. '''
  621. if not self.__locked_fh:
  622. self._acquire_lock(for_save=True)
  623. fh_new = tempfile.NamedTemporaryFile(
  624. prefix=self._store, delete=False)
  625. lxml.etree.ElementTree(self.__xml__()).write(
  626. fh_new, encoding='utf-8', pretty_print=True)
  627. fh_new.flush()
  628. try:
  629. os.chown(fh_new.name, -1, grp.getgrnam('qubes').gr_gid)
  630. os.chmod(fh_new.name, 0o660)
  631. except KeyError: # group 'qubes' not found
  632. # don't change mode if no 'qubes' group in the system
  633. pass
  634. os.rename(fh_new.name, self._store)
  635. # update stored mtime, in case of multiple save() calls without
  636. # loading qubes.xml again
  637. self.__load_timestamp = os.path.getmtime(self._store)
  638. # this releases lock for all other processes,
  639. # but they should instantly block on the new descriptor
  640. self.__locked_fh.close()
  641. self.__locked_fh = fh_new
  642. if not lock:
  643. self._release_lock()
  644. def _acquire_lock(self, for_save=False):
  645. assert self.__locked_fh is None, 'double lock'
  646. while True:
  647. try:
  648. fd = os.open(self._store,
  649. os.O_RDWR | (os.O_CREAT * int(for_save)))
  650. except OSError as e:
  651. if not for_save and e.errno == errno.ENOENT:
  652. raise qubes.exc.QubesException(
  653. 'Qubes XML store {!r} is missing; '
  654. 'use qubes-create tool'.format(self._store))
  655. raise
  656. # While we were waiting for lock, someone could have unlink()ed
  657. # (or rename()d) our file out of the filesystem. We have to
  658. # ensure we got lock on something linked to filesystem.
  659. # If not, try again.
  660. if os.fstat(fd) != os.stat(self._store):
  661. os.close(fd)
  662. continue
  663. if self.__load_timestamp and \
  664. os.path.getmtime(self._store) != self.__load_timestamp:
  665. os.close(fd)
  666. raise qubes.exc.QubesException(
  667. 'Someone else modified qubes.xml in the meantime')
  668. break
  669. if os.name == 'posix':
  670. fcntl.lockf(fd, fcntl.LOCK_EX)
  671. elif os.name == 'nt':
  672. # pylint: disable=protected-access
  673. overlapped = pywintypes.OVERLAPPED()
  674. win32file.LockFileEx(
  675. win32file._get_osfhandle(fd),
  676. win32con.LOCKFILE_EXCLUSIVE_LOCK, 0, -0x10000, overlapped)
  677. self.__locked_fh = os.fdopen(fd, 'r+b')
  678. return self.__locked_fh
  679. def _release_lock(self):
  680. assert self.__locked_fh is not None, 'double release'
  681. # intentionally do not call explicit unlock to not unlock the file
  682. # before all buffers are flushed
  683. self.__locked_fh.close()
  684. self.__locked_fh = None
  685. def load_initial_values(self):
  686. self.labels = {
  687. 1: qubes.Label(1, '0xcc0000', 'red'),
  688. 2: qubes.Label(2, '0xf57900', 'orange'),
  689. 3: qubes.Label(3, '0xedd400', 'yellow'),
  690. 4: qubes.Label(4, '0x73d216', 'green'),
  691. 5: qubes.Label(5, '0x555753', 'gray'),
  692. 6: qubes.Label(6, '0x3465a4', 'blue'),
  693. 7: qubes.Label(7, '0x75507b', 'purple'),
  694. 8: qubes.Label(8, '0x000000', 'black'),
  695. }
  696. assert max(self.labels.keys()) == qubes.config.max_default_label
  697. # check if the default LVM Thin pool qubes_dom0/pool00 exists
  698. if os.path.exists('/dev/mapper/qubes_dom0-pool00-tpool'):
  699. self.add_pool(volume_group='qubes_dom0', thin_pool='pool00',
  700. name='default', driver='lvm_thin')
  701. else:
  702. self.pools['default'] = self._get_pool(
  703. dir_path=qubes.config.qubes_base_dir,
  704. name='default', driver='file')
  705. for name, config in qubes.config.defaults['pool_configs'].items():
  706. self.pools[name] = self._get_pool(**config)
  707. self.domains.add(
  708. qubes.vm.adminvm.AdminVM(self, None, label='black'))
  709. @classmethod
  710. def create_empty_store(cls, *args, **kwargs):
  711. self = cls(*args, load=False, **kwargs)
  712. if os.path.exists(self.store):
  713. raise qubes.exc.QubesException(
  714. '{} already exists, aborting'.format(self.store))
  715. self.load_initial_values()
  716. # TODO py3 get lock= as keyword-only arg
  717. self.save(kwargs.get('lock'))
  718. return self
  719. def xml_labels(self):
  720. '''Serialise labels
  721. :rtype: lxml.etree._Element
  722. '''
  723. labels = lxml.etree.Element('labels')
  724. for label in sorted(self.labels.values(), key=lambda labl: labl.index):
  725. labels.append(label.__xml__())
  726. return labels
  727. @staticmethod
  728. def get_vm_class(clsname):
  729. '''Find the class for a domain.
  730. Classes are registered as setuptools' entry points in ``qubes.vm``
  731. group. Any package may supply their own classes.
  732. :param str clsname: name of the class
  733. :return type: class
  734. '''
  735. try:
  736. return qubes.utils.get_entry_point_one(
  737. qubes.vm.VM_ENTRY_POINT, clsname)
  738. except KeyError:
  739. raise qubes.exc.QubesException(
  740. 'no such VM class: {!r}'.format(clsname))
  741. # don't catch TypeError
  742. def add_new_vm(self, cls, qid=None, **kwargs):
  743. '''Add new Virtual Machine to collection
  744. '''
  745. if qid is None:
  746. qid = self.domains.get_new_unused_qid()
  747. if isinstance(cls, str):
  748. cls = self.get_vm_class(cls)
  749. # handle default template; specifically allow template=None (do not
  750. # override it with default template)
  751. if 'template' not in kwargs and hasattr(cls, 'template'):
  752. kwargs['template'] = self.default_template
  753. elif 'template' in kwargs and isinstance(kwargs['template'], str):
  754. kwargs['template'] = self.domains[kwargs['template']]
  755. return self.domains.add(cls(self, None, qid=qid, **kwargs))
  756. def get_label(self, label):
  757. '''Get label as identified by index or name
  758. :throws KeyError: when label is not found
  759. '''
  760. # first search for index, verbatim
  761. try:
  762. return self.labels[label]
  763. except KeyError:
  764. pass
  765. # then search for name
  766. for i in self.labels.values():
  767. if i.name == label:
  768. return i
  769. # last call, if label is a number represented as str, search in indices
  770. try:
  771. return self.labels[int(label)]
  772. except (KeyError, ValueError):
  773. pass
  774. raise KeyError(label)
  775. def add_pool(self, name, **kwargs):
  776. """ Add a storage pool to config."""
  777. if name in self.pools.keys():
  778. raise qubes.exc.QubesException('pool named %s already exists \n' %
  779. name)
  780. kwargs['name'] = name
  781. pool = self._get_pool(**kwargs)
  782. pool.setup()
  783. self.pools[name] = pool
  784. return pool
  785. def remove_pool(self, name):
  786. """ Remove a storage pool from config file. """
  787. try:
  788. pool = self.pools[name]
  789. del self.pools[name]
  790. pool.destroy()
  791. except KeyError:
  792. return
  793. def get_pool(self, pool):
  794. ''' Returns a :py:class:`qubes.storage.Pool` instance '''
  795. if isinstance(pool, qubes.storage.Pool):
  796. return pool
  797. try:
  798. return self.pools[pool]
  799. except KeyError:
  800. raise qubes.exc.QubesException('Unknown storage pool ' + pool)
  801. @staticmethod
  802. def _get_pool(**kwargs):
  803. try:
  804. name = kwargs['name']
  805. assert name, 'Name needs to be an non empty string'
  806. except KeyError:
  807. raise qubes.exc.QubesException('No pool name for pool')
  808. try:
  809. driver = kwargs['driver']
  810. except KeyError:
  811. raise qubes.exc.QubesException('No driver specified for pool ' +
  812. name)
  813. try:
  814. klass = qubes.utils.get_entry_point_one(
  815. qubes.storage.STORAGE_ENTRY_POINT, driver)
  816. del kwargs['driver']
  817. return klass(**kwargs)
  818. except KeyError:
  819. raise qubes.exc.QubesException('No driver %s for pool %s' %
  820. (driver, name))
  821. @qubes.events.handler('domain-pre-delete')
  822. def on_domain_pre_deleted(self, event, vm):
  823. # pylint: disable=unused-argument
  824. if isinstance(vm, qubes.vm.templatevm.TemplateVM):
  825. appvms = self.domains.get_vms_based_on(vm)
  826. if appvms:
  827. raise qubes.exc.QubesException(
  828. 'Cannot remove template that has dependent AppVMs. '
  829. 'Affected are: {}'.format(', '.join(
  830. appvm.name for appvm in sorted(appvms))))
  831. @qubes.events.handler('domain-delete')
  832. def on_domain_deleted(self, event, vm):
  833. # pylint: disable=unused-argument
  834. for propname in (
  835. 'default_netvm',
  836. 'default_fw_netvm',
  837. 'clockvm',
  838. 'updatevm',
  839. 'default_template',
  840. ):
  841. try:
  842. if getattr(self, propname) == vm:
  843. delattr(self, propname)
  844. except AttributeError:
  845. pass
  846. @qubes.events.handler('property-pre-set:clockvm')
  847. def on_property_pre_set_clockvm(self, event, name, newvalue, oldvalue=None):
  848. # pylint: disable=unused-argument,no-self-use
  849. if newvalue is None:
  850. return
  851. if newvalue.features.get('service/ntpd', False):
  852. raise qubes.exc.QubesVMError(newvalue,
  853. 'Cannot set {!r} as {!r} since it has ntpd enabled.'.format(
  854. newvalue.name, name))
  855. else:
  856. newvalue.features['service/ntpd'] = ''
  857. @qubes.events.handler(
  858. 'property-pre-set:default_netvm',
  859. 'property-pre-set:default_fw_netvm')
  860. def on_property_pre_set_default_netvm(self, event, name, newvalue,
  861. oldvalue=None):
  862. # pylint: disable=unused-argument,invalid-name
  863. if newvalue is not None and oldvalue is not None \
  864. and oldvalue.is_running() and not newvalue.is_running() \
  865. and self.domains.get_vms_connected_to(oldvalue):
  866. raise qubes.exc.QubesVMNotRunningError(newvalue,
  867. 'Cannot change {!r} to domain that '
  868. 'is not running ({!r}).'.format(name, newvalue.name))
  869. @qubes.events.handler('property-set:default_fw_netvm')
  870. def on_property_set_default_fw_netvm(self, event, name, newvalue,
  871. oldvalue=None):
  872. # pylint: disable=unused-argument,invalid-name
  873. for vm in self.domains:
  874. if not vm.provides_network and vm.property_is_default('netvm'):
  875. # fire property-del:netvm as it is responsible for resetting
  876. # netvm to it's default value
  877. vm.fire_event('property-del:netvm',
  878. name='netvm', newvalue=newvalue, oldvalue=oldvalue)
  879. @qubes.events.handler('property-set:default_netvm')
  880. def on_property_set_default_netvm(self, event, name, newvalue,
  881. oldvalue=None):
  882. # pylint: disable=unused-argument
  883. for vm in self.domains:
  884. if hasattr(vm, 'netvm') and vm.property_is_default('netvm'):
  885. # fire property-del:netvm as it is responsible for resetting
  886. # netvm to it's default value
  887. vm.fire_event('property-del:netvm',
  888. name='netvm', oldvalue=oldvalue)