123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113 |
- #!/usr/bin/env python2
- # -*- encoding: utf8 -*-
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2016 Bahtiar `kalkin-` Gadimov <bahtiar@gadimov.de>
- #
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation; either version 2 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License along
- # with this program; if not, write to the Free Software Foundation, Inc.,
- # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- #
- ''' Manages block devices in a domain '''
- import string
- from qubes.storage import Pool, Volume
- class DomainPool(Pool):
- ''' This pool manages all the block devices of a domain.
- The devices are queried through :py:module:`qubesdb`
- '''
- driver = 'domain'
- def __init__(self, vm):
- self.vm = vm
- super(DomainPool, self).__init__(name='p_' + vm.name)
- @property
- def volumes(self):
- ''' Queries qubesdb and returns volumes for `self.vm` '''
- qdb = self.vm.qdb
- safe_set = set(string.letters + string.digits + string.punctuation)
- allowed_attributes = {'desc': string.printable,
- 'mode': string.letters,
- 'size': string.digits}
- if not self.vm.is_running():
- return []
- untrusted_qubes_devices = qdb.list('/qubes-block-devices/')
- # because we get each path 3 x times as
- # /qubes-block-devices/foo/{desc,mode,size} we need to merge this
- devices = {}
- for untrusted_device_path in untrusted_qubes_devices:
- if not all(c in safe_set for c in untrusted_device_path):
- msg = ("%s vm's device path name contains unsafe characters. "
- "Skipping it.")
- self.vm.log.warning(msg % self.vm.name)
- continue
- # name can be trusted because it was checked as a part of
- # untrusted_device_path check above
- _, _, name, untrusted_atr = untrusted_device_path.split('/', 4)
- if untrusted_atr in allowed_attributes.keys():
- atr = untrusted_atr
- else:
- msg = ('{!s} has an unknown qubes-block-device atr {!s} '
- 'Skipping it')
- self.vm.log.error(msg.format(self.vm.name, untrusted_atr))
- continue
- untrusted_value = qdb.read(untrusted_device_path)
- allowed_characters = allowed_attributes[atr]
- if all(c in allowed_characters for c in untrusted_value):
- value = untrusted_value
- else:
- msg = ("{!s} vm's device path {!s} contains unsafe characters")
- self.vm.log.error(msg.format(self.vm.name, atr))
- continue
- if name not in devices.keys():
- devices[name] = {}
- devices[name][atr] = value
- return [DomainVolume(n, self.name, **atrs)
- for n, atrs in devices.items()]
- def clone(self, source, target):
- raise NotImplementedError
- def __xml__(self):
- return None
- class DomainVolume(Volume):
- ''' A volume provided by a block device in an domain '''
- def __init__(self, name, pool, desc, mode, size):
- if mode == 'w':
- volume_type = 'read-write'
- else:
- volume_type = 'read-only'
- super(DomainVolume, self).__init__(desc,
- pool,
- volume_type,
- vid=name,
- size=size,
- removable=True)
|