app.py 53 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563
  1. #
  2. # The Qubes OS Project, https://www.qubes-os.org/
  3. #
  4. # Copyright (C) 2010-2015 Joanna Rutkowska <joanna@invisiblethingslab.com>
  5. # Copyright (C) 2011-2015 Marek Marczykowski-Górecki
  6. # <marmarek@invisiblethingslab.com>
  7. # Copyright (C) 2014-2015 Wojtek Porczyk <woju@invisiblethingslab.com>
  8. #
  9. # This library is free software; you can redistribute it and/or
  10. # modify it under the terms of the GNU Lesser General Public
  11. # License as published by the Free Software Foundation; either
  12. # version 2.1 of the License, or (at your option) any later version.
  13. #
  14. # This library is distributed in the hope that it will be useful,
  15. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  17. # Lesser General Public License for more details.
  18. #
  19. # You should have received a copy of the GNU Lesser General Public
  20. # License along with this library; if not, see <https://www.gnu.org/licenses/>.
  21. #
  22. import collections.abc
  23. import copy
  24. import functools
  25. import grp
  26. import itertools
  27. import logging
  28. import os
  29. import random
  30. import sys
  31. import tempfile
  32. import time
  33. import traceback
  34. import uuid
  35. from contextlib import suppress
  36. import asyncio
  37. import jinja2
  38. import libvirt
  39. import lxml.etree
  40. try:
  41. import xen.lowlevel.xs # pylint: disable=wrong-import-order
  42. import xen.lowlevel.xc # pylint: disable=wrong-import-order
  43. except ImportError:
  44. pass
  45. if os.name == 'posix':
  46. # pylint: disable=wrong-import-order
  47. import fcntl
  48. elif os.name == 'nt':
  49. # pylint: disable=import-error
  50. import win32con
  51. import win32file
  52. import pywintypes
  53. else:
  54. raise RuntimeError("Qubes works only on POSIX or WinNT systems")
  55. # pylint: disable=wrong-import-position
  56. import qubes
  57. import qubes.ext
  58. import qubes.utils
  59. import qubes.storage
  60. import qubes.storage.reflink
  61. import qubes.vm
  62. import qubes.vm.adminvm
  63. import qubes.vm.qubesvm
  64. import qubes.vm.templatevm
  65. # pylint: enable=wrong-import-position
  66. class VirDomainWrapper:
  67. # pylint: disable=too-few-public-methods
  68. def __init__(self, connection, vm):
  69. self._connection = connection
  70. self._vm = vm
  71. def _reconnect_if_dead(self):
  72. try:
  73. is_dead = not self._vm.connect().isAlive()
  74. except libvirt.libvirtError as ex:
  75. if ex.get_error_code() == libvirt.VIR_ERR_INVALID_CONN:
  76. # connection to libvirt was re-established in the meantime
  77. is_dead = True
  78. else:
  79. raise
  80. if is_dead:
  81. # pylint: disable=protected-access
  82. self._connection._reconnect_if_dead()
  83. self._vm = self._connection._conn.lookupByUUID(self._vm.UUID())
  84. return is_dead
  85. def __getattr__(self, attrname):
  86. attr = getattr(self._vm, attrname)
  87. if not isinstance(attr, collections.abc.Callable):
  88. return attr
  89. @functools.wraps(attr)
  90. def wrapper(*args, **kwargs):
  91. try:
  92. return attr(*args, **kwargs)
  93. except libvirt.libvirtError:
  94. if self._reconnect_if_dead():
  95. return getattr(self._vm, attrname)(*args, **kwargs)
  96. raise
  97. return wrapper
  98. class VirConnectWrapper:
  99. # pylint: disable=too-few-public-methods
  100. def __init__(self, uri, reconnect_cb=None):
  101. self._conn = libvirt.open(uri)
  102. self._reconnect_cb = reconnect_cb
  103. def _reconnect_if_dead(self):
  104. is_dead = not self._conn.isAlive()
  105. if is_dead:
  106. uri = self._conn.getURI()
  107. old_conn = self._conn
  108. self._conn = libvirt.open(uri)
  109. if callable(self._reconnect_cb):
  110. self._reconnect_cb(old_conn)
  111. old_conn.close()
  112. return is_dead
  113. def _wrap_domain(self, ret):
  114. if isinstance(ret, libvirt.virDomain):
  115. ret = VirDomainWrapper(self, ret)
  116. return ret
  117. def __getattr__(self, attrname):
  118. attr = getattr(self._conn, attrname)
  119. if not isinstance(attr, collections.abc.Callable):
  120. return attr
  121. if attrname == 'close':
  122. return attr
  123. @functools.wraps(attr)
  124. def wrapper(*args, **kwargs):
  125. try:
  126. return self._wrap_domain(attr(*args, **kwargs))
  127. except libvirt.libvirtError:
  128. if self._reconnect_if_dead():
  129. return self._wrap_domain(
  130. getattr(self._conn, attrname)(*args, **kwargs))
  131. raise
  132. return wrapper
  133. class VMMConnection:
  134. """Connection to Virtual Machine Manager (libvirt)"""
  135. def __init__(self, offline_mode=None, libvirt_reconnect_cb=None):
  136. """
  137. :param offline_mode: enable/disable offline mode; default is to
  138. enable when running in chroot as root, otherwise disable
  139. :param libvirt_reconnect_cb: callable to be called when connection to
  140. libvirt is re-established; the callback is called with old connection
  141. as argument
  142. """
  143. if offline_mode is None:
  144. offline_mode = bool(os.getuid() == 0 and
  145. os.stat('/') != os.stat('/proc/1/root/.'))
  146. self._offline_mode = offline_mode
  147. self._libvirt_reconnect_cb = libvirt_reconnect_cb
  148. self._libvirt_conn = None
  149. self._xs = None
  150. self._xc = None
  151. @property
  152. def offline_mode(self):
  153. """Check or enable offline mode (do not actually connect to vmm)"""
  154. return self._offline_mode
  155. def _libvirt_error_handler(self, ctx, error):
  156. pass
  157. def init_vmm_connection(self):
  158. """Initialise connection
  159. This method is automatically called when getting"""
  160. if self._libvirt_conn is not None:
  161. # Already initialized
  162. return
  163. if self._offline_mode:
  164. # Do not initialize in offline mode
  165. raise qubes.exc.QubesException(
  166. 'VMM operations disabled in offline mode')
  167. if 'xen.lowlevel.xs' in sys.modules:
  168. self._xs = xen.lowlevel.xs.xs()
  169. if 'xen.lowlevel.xc' in sys.modules:
  170. self._xc = xen.lowlevel.xc.xc()
  171. self._libvirt_conn = VirConnectWrapper(
  172. qubes.config.defaults['libvirt_uri'],
  173. reconnect_cb=self._libvirt_reconnect_cb)
  174. libvirt.registerErrorHandler(self._libvirt_error_handler, None)
  175. @property
  176. def libvirt_conn(self):
  177. """Connection to libvirt"""
  178. self.init_vmm_connection()
  179. return self._libvirt_conn
  180. @property
  181. def xs(self):
  182. """Connection to Xen Store
  183. This property in available only when running on Xen.
  184. """
  185. # XXX what about the case when we run under KVM,
  186. # but xen modules are importable?
  187. if 'xen.lowlevel.xs' not in sys.modules:
  188. raise AttributeError(
  189. 'xs object is available under Xen hypervisor only')
  190. self.init_vmm_connection()
  191. return self._xs
  192. @property
  193. def xc(self):
  194. """Connection to Xen
  195. This property in available only when running on Xen.
  196. """
  197. # XXX what about the case when we run under KVM,
  198. # but xen modules are importable?
  199. if 'xen.lowlevel.xc' not in sys.modules:
  200. raise AttributeError(
  201. 'xc object is available under Xen hypervisor only')
  202. self.init_vmm_connection()
  203. return self._xc
  204. def close(self):
  205. libvirt.registerErrorHandler(None, None)
  206. if self._xs:
  207. self._xs.close()
  208. self._xs = None
  209. if self._libvirt_conn:
  210. self._libvirt_conn.close()
  211. self._libvirt_conn = None
  212. self._xc = None # and pray it will get garbage-collected
  213. class QubesHost:
  214. """Basic information about host machine
  215. :param qubes.Qubes app: Qubes application context (must have \
  216. :py:attr:`Qubes.vmm` attribute defined)
  217. """
  218. def __init__(self, app):
  219. self.app = app
  220. self._no_cpus = None
  221. self._total_mem = None
  222. self._physinfo = None
  223. self._cpu_family = None
  224. self._cpu_model = None
  225. def _fetch(self):
  226. if self._no_cpus is not None:
  227. return
  228. # pylint: disable=unused-variable
  229. (model, memory, cpus, mhz, nodes, socket, cores, threads) = \
  230. self.app.vmm.libvirt_conn.getInfo()
  231. self._total_mem = int(memory) * 1024
  232. self._no_cpus = cpus
  233. self.app.log.debug('QubesHost: no_cpus={} memory_total={}'.format(
  234. self.no_cpus, self.memory_total))
  235. with suppress(NotImplementedError):
  236. self.app.log.debug('QubesHost: xen_free_memory={}'.format(
  237. self.get_free_xen_memory()))
  238. @property
  239. def memory_total(self):
  240. """Total memory, in kbytes"""
  241. if self.app.vmm.offline_mode:
  242. return 2 ** 64 - 1
  243. self._fetch()
  244. return self._total_mem
  245. @property
  246. def no_cpus(self):
  247. """Number of CPUs"""
  248. if self.app.vmm.offline_mode:
  249. return 42
  250. self._fetch()
  251. return self._no_cpus
  252. @property
  253. def cpu_family_model(self):
  254. """Get CPU family and model"""
  255. if self._cpu_family is None or self._cpu_model is None:
  256. family = None
  257. model = None
  258. with open('/proc/cpuinfo') as cpuinfo:
  259. for line in cpuinfo.readlines():
  260. line = line.strip()
  261. if not line:
  262. # take info from the first core
  263. break
  264. field, value = line.split(':', 1)
  265. if field.strip() == 'model':
  266. model = int(value.strip())
  267. elif field.strip() == 'cpu family':
  268. family = int(value.strip())
  269. self._cpu_family = family
  270. self._cpu_model = model
  271. return self._cpu_family, self._cpu_model
  272. def get_free_xen_memory(self):
  273. """Get free memory from Xen's physinfo.
  274. :raises NotImplementedError: when not under Xen
  275. """
  276. try:
  277. self._physinfo = self.app.vmm.xc.physinfo()
  278. except AttributeError:
  279. raise NotImplementedError('This function requires Xen hypervisor')
  280. return int(self._physinfo['free_memory'])
  281. def is_iommu_supported(self):
  282. """Check if IOMMU is supported on this platform"""
  283. if self._physinfo is None:
  284. try:
  285. self._physinfo = self.app.vmm.xc.physinfo()
  286. except AttributeError:
  287. raise NotImplementedError(
  288. 'This function requires Xen hypervisor')
  289. return 'hvm_directio' in self._physinfo['virt_caps']
  290. def get_vm_stats(self, previous_time=None, previous=None, only_vm=None):
  291. """Measure cpu usage for all domains at once.
  292. If previous measurements are given, CPU usage will be given in
  293. percents of time. Otherwise only absolute value (seconds).
  294. Return a tuple of (measurements_time, measurements),
  295. where measurements is a dictionary with key: domid, value: dict:
  296. - cpu_time - absolute CPU usage (seconds since its startup)
  297. - cpu_usage_raw - CPU usage in %
  298. - cpu_usage - CPU usage in % (normalized to number of vcpus)
  299. - memory_kb - current memory assigned, in kb
  300. This function requires Xen hypervisor.
  301. ..warning:
  302. This function may return info about implementation-specific VMs,
  303. like stubdomains for HVM
  304. :param previous: previous measurement
  305. :param previous_time: time of previous measurement
  306. :param only_vm: get measurements only for this VM
  307. :raises NotImplementedError: when not under Xen
  308. """
  309. if (previous_time is None) != (previous is None):
  310. raise ValueError(
  311. 'previous and previous_time must be given together (or none)')
  312. if previous is None:
  313. previous = {}
  314. current_time = time.time()
  315. current = {}
  316. try:
  317. if only_vm:
  318. xid = only_vm.xid
  319. if xid < 0:
  320. raise qubes.exc.QubesVMNotRunningError(only_vm)
  321. info = self.app.vmm.xc.domain_getinfo(xid, 1)
  322. if info[0]['domid'] != xid:
  323. raise qubes.exc.QubesVMNotRunningError(only_vm)
  324. else:
  325. info = self.app.vmm.xc.domain_getinfo(0, 1024)
  326. except AttributeError:
  327. raise NotImplementedError(
  328. 'This function requires Xen hypervisor')
  329. # TODO: add stubdomain stats to actual VMs
  330. for vm in info:
  331. domid = vm['domid']
  332. current[domid] = {}
  333. current[domid]['memory_kb'] = vm['mem_kb']
  334. current[domid]['cpu_time'] = int(vm['cpu_time'])
  335. vcpus = max(vm['online_vcpus'], 1)
  336. if domid in previous:
  337. current[domid]['cpu_usage_raw'] = int(
  338. (current[domid]['cpu_time'] - previous[domid]['cpu_time'])
  339. / 1000 ** 3 * 100 / (current_time - previous_time))
  340. if current[domid]['cpu_usage_raw'] < 0:
  341. # VM has been rebooted
  342. current[domid]['cpu_usage_raw'] = 0
  343. else:
  344. current[domid]['cpu_usage_raw'] = 0
  345. current[domid]['cpu_usage'] = \
  346. int(current[domid]['cpu_usage_raw'] / vcpus)
  347. return current_time, current
  348. class VMCollection:
  349. """A collection of Qubes VMs
  350. VMCollection supports ``in`` operator. You may test for ``qid``, ``name``
  351. and whole VM object's presence.
  352. Iterating over VMCollection will yield machine objects.
  353. """
  354. def __init__(self, app):
  355. self.app = app
  356. self._dict = dict()
  357. def close(self):
  358. del self.app
  359. self._dict.clear()
  360. del self._dict
  361. def __repr__(self):
  362. return '<{} {!r}>'.format(
  363. self.__class__.__name__, list(sorted(self.keys())))
  364. def items(self):
  365. """Iterate over ``(qid, vm)`` pairs"""
  366. for qid in self.qids():
  367. yield (qid, self[qid])
  368. def qids(self):
  369. """Iterate over all qids
  370. qids are sorted by numerical order.
  371. """
  372. return iter(sorted(self._dict.keys()))
  373. keys = qids
  374. def names(self):
  375. """Iterate over all names
  376. names are sorted by lexical order.
  377. """
  378. return iter(sorted(vm.name for vm in self._dict.values()))
  379. def vms(self):
  380. """Iterate over all machines
  381. vms are sorted by qid.
  382. """
  383. return iter(sorted(self._dict.values()))
  384. __iter__ = vms
  385. values = vms
  386. def add(self, value, _enable_events=True):
  387. """Add VM to collection
  388. :param qubes.vm.BaseVM value: VM to add
  389. :param _enable_events:
  390. :raises TypeError: when value is of wrong type
  391. :raises ValueError: when there is already VM which has equal ``qid``
  392. """
  393. # this violates duck typing, but is needed
  394. # for VMProperty to function correctly
  395. if not isinstance(value, qubes.vm.BaseVM):
  396. raise TypeError('{} holds only BaseVM instances'.format(
  397. self.__class__.__name__))
  398. if value.qid in self:
  399. raise ValueError('This collection already holds VM that has '
  400. 'qid={!r} ({!r})'.format(value.qid,
  401. self[value.qid]))
  402. if value.name in self:
  403. raise ValueError('A VM named {!s} already exists'
  404. .format(value.name))
  405. self._dict[value.qid] = value
  406. if _enable_events:
  407. value.events_enabled = True
  408. self.app.fire_event('domain-add', vm=value)
  409. return value
  410. def __getitem__(self, key):
  411. if isinstance(key, int):
  412. return self._dict[key]
  413. if isinstance(key, str):
  414. for vm in self:
  415. if vm.name == key:
  416. return vm
  417. raise KeyError(key)
  418. if isinstance(key, qubes.vm.BaseVM):
  419. key = key.uuid
  420. if isinstance(key, uuid.UUID):
  421. for vm in self:
  422. if vm.uuid == key:
  423. return vm
  424. raise KeyError(key)
  425. raise KeyError(key)
  426. def __delitem__(self, key):
  427. vm = self[key]
  428. if not vm.is_halted():
  429. raise qubes.exc.QubesVMNotHaltedError(vm)
  430. self.app.fire_event('domain-pre-delete', pre_event=True, vm=vm)
  431. try:
  432. if vm.libvirt_domain:
  433. vm.libvirt_domain.undefine()
  434. # pylint: disable=protected-access
  435. vm._libvirt_domain = None
  436. except libvirt.libvirtError as e:
  437. if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
  438. # already undefined
  439. pass
  440. del self._dict[vm.qid]
  441. self.app.fire_event('domain-delete', vm=vm)
  442. def __contains__(self, key):
  443. return any((key in (vm, vm.qid, vm.name))
  444. for vm in self)
  445. def __len__(self):
  446. return len(self._dict)
  447. def get_vms_based_on(self, template):
  448. template = self[template]
  449. return set(vm for vm in self
  450. if hasattr(vm, 'template') and vm.template == template)
  451. def get_vms_connected_to(self, netvm):
  452. new_vms = {self[netvm]}
  453. dependent_vms = set()
  454. # Dependency resolving only makes sense on NetVM (or derivative)
  455. # if not self[netvm_qid].is_netvm():
  456. # return set([])
  457. while new_vms:
  458. cur_vm = new_vms.pop()
  459. for vm in cur_vm.connected_vms:
  460. if vm in dependent_vms:
  461. continue
  462. dependent_vms.add(vm)
  463. # if vm.is_netvm():
  464. new_vms.add(vm)
  465. return dependent_vms
  466. # XXX with Qubes Admin Api this will probably lead to race condition
  467. # whole process of creating and adding should be synchronised
  468. def get_new_unused_qid(self):
  469. used_ids = set(self.qids())
  470. for i in range(1, qubes.config.max_qid):
  471. if i not in used_ids:
  472. return i
  473. raise LookupError("Cannot find unused qid!")
  474. def get_new_unused_dispid(self):
  475. for _ in range(int(qubes.config.max_dispid ** 0.5)):
  476. dispid = random.SystemRandom().randrange(qubes.config.max_dispid)
  477. if not any(getattr(vm, 'dispid', None) == dispid for vm in self):
  478. return dispid
  479. raise LookupError((
  480. 'https://xkcd.com/221/',
  481. 'http://dilbert.com/strip/2001-10-25')[
  482. random.randint(0, 1)])
  483. def _default_pool(app):
  484. """ Default storage pool.
  485. 1. If there is one named 'default', use it.
  486. 2. Check if root fs is on LVM thin - use that
  487. 3. Look for file(-reflink)-based pool pointing to /var/lib/qubes
  488. 4. Fail
  489. """
  490. if 'default' in app.pools:
  491. return app.pools['default']
  492. if 'DEFAULT_LVM_POOL' in os.environ:
  493. thin_pool = os.environ['DEFAULT_LVM_POOL']
  494. for pool in app.pools.values():
  495. if pool.config.get('driver', None) != 'lvm_thin':
  496. continue
  497. if pool.config['thin_pool'] == thin_pool:
  498. return pool
  499. # no DEFAULT_LVM_POOL, or pool not defined
  500. root_volume_group, root_thin_pool = \
  501. qubes.storage.DirectoryThinPool.thin_pool('/')
  502. if root_thin_pool:
  503. for pool in app.pools.values():
  504. if pool.config.get('driver', None) != 'lvm_thin':
  505. continue
  506. if (pool.config['volume_group'] == root_volume_group and
  507. pool.config['thin_pool'] == root_thin_pool):
  508. return pool
  509. # not a thin volume? look for file pools
  510. for pool in app.pools.values():
  511. if pool.config.get('driver', None) not in ('file', 'file-reflink'):
  512. continue
  513. if pool.config['dir_path'] == qubes.config.qubes_base_dir:
  514. return pool
  515. raise AttributeError('Cannot determine default storage pool')
  516. def _setter_pool(app, prop, value):
  517. if isinstance(value, qubes.storage.Pool):
  518. return value
  519. try:
  520. return app.pools[value]
  521. except KeyError:
  522. raise qubes.exc.QubesPropertyValueError(app, prop, value,
  523. 'No such storage pool')
  524. def _setter_default_netvm(app, prop, value):
  525. # skip netvm loop check while loading qubes.xml, to avoid tricky loading
  526. # order
  527. if not app.events_enabled:
  528. return value
  529. if value is None:
  530. return value
  531. # forbid setting to a value that would result in netvm loop
  532. for vm in app.domains:
  533. if not hasattr(vm, 'netvm'):
  534. continue
  535. if not vm.property_is_default('netvm'):
  536. continue
  537. if value == vm \
  538. or value in app.domains.get_vms_connected_to(vm):
  539. raise qubes.exc.QubesPropertyValueError(
  540. app, prop, value, 'Network loop on \'{!s}\''.format(vm))
  541. return value
  542. class Qubes(qubes.PropertyHolder):
  543. """Main Qubes application
  544. :param str store: path to ``qubes.xml``
  545. The store is loaded in stages:
  546. 1. In the first stage there are loaded some basic features from store
  547. (currently labels).
  548. 2. In the second stage stubs for all VMs are loaded. They are filled
  549. with their basic properties, like ``qid`` and ``name``.
  550. 3. In the third stage all global properties are loaded. They often
  551. reference VMs, like default netvm, so they should be filled after
  552. loading VMs.
  553. 4. In the fourth stage all remaining VM properties are loaded. They
  554. also need all VMs loaded, because they represent dependencies
  555. between VMs like aforementioned netvm.
  556. 5. In the fifth stage there are some fixups to ensure sane system
  557. operation.
  558. This class emits following events:
  559. .. event:: domain-add (subject, event, vm)
  560. When domain is added.
  561. :param subject: Event emitter
  562. :param event: Event name (``'domain-add'``)
  563. :param vm: Domain object
  564. .. event:: domain-pre-delete (subject, event, vm)
  565. When domain is deleted. VM still has reference to ``app`` object,
  566. and is contained within VMCollection. You may prevent removal by
  567. raising an exception.
  568. :param subject: Event emitter
  569. :param event: Event name (``'domain-pre-delete'``)
  570. :param vm: Domain object
  571. .. event:: domain-delete (subject, event, vm)
  572. When domain is deleted. VM still has reference to ``app`` object,
  573. but is not contained within VMCollection.
  574. :param subject: Event emitter
  575. :param event: Event name (``'domain-delete'``)
  576. :param vm: Domain object
  577. .. event:: pool-add (subject, event, pool)
  578. When storage pool is added.
  579. Handler for this event can be asynchronous (a coroutine).
  580. :param subject: Event emitter
  581. :param event: Event name (``'pool-add'``)
  582. :param pool: Pool object
  583. .. event:: pool-pre-delete (subject, event, pool)
  584. When pool is deleted. Pool is still contained within app.pools
  585. dictionary. You may prevent removal by raising an exception.
  586. Handler for this event can be asynchronous (a coroutine).
  587. :param subject: Event emitter
  588. :param event: Event name (``'pool-pre-delete'``)
  589. :param pool: Pool object
  590. .. event:: pool-delete (subject, event, pool)
  591. When storage pool is deleted. The pool is already removed at this
  592. point.
  593. Handler for this event can be asynchronous (a coroutine).
  594. :param subject: Event emitter
  595. :param event: Event name (``'pool-delete'``)
  596. :param pool: Pool object
  597. .. event:: qubes-close (subject, event)
  598. Fired when this Qubes() object instance is going to be closed
  599. and destroyed. In practice it is called only during tests, to
  600. cleanup objects from one test, before another.
  601. It is _not_ called when qubesd daemon is stopped.
  602. :param subject: Event emitter
  603. :param event: Event name (``'qubes-close'``)
  604. Methods and attributes:
  605. """
  606. default_guivm = qubes.VMProperty(
  607. 'default_guivm',
  608. load_stage=3,
  609. default=lambda app: app.domains['dom0'], allow_none=True,
  610. doc='Default GuiVM for VMs.')
  611. default_audiovm = qubes.VMProperty(
  612. 'default_audiovm',
  613. load_stage=3,
  614. default=lambda app: app.domains['dom0'], allow_none=True,
  615. doc='Default AudioVM for VMs.')
  616. default_netvm = qubes.VMProperty(
  617. 'default_netvm',
  618. load_stage=3,
  619. default=None, allow_none=True,
  620. setter=_setter_default_netvm,
  621. doc="""Default NetVM for AppVMs. Initial state is `None`, which means
  622. that AppVMs are not connected to the Internet.""")
  623. default_template = qubes.VMProperty(
  624. 'default_template', load_stage=3,
  625. vmclass=qubes.vm.templatevm.TemplateVM,
  626. doc='Default template for new AppVMs',
  627. allow_none=True)
  628. updatevm = qubes.VMProperty(
  629. 'updatevm', load_stage=3,
  630. default=None, allow_none=True,
  631. doc="""Which VM to use as `yum` proxy for updating AdminVM and
  632. TemplateVMs""")
  633. clockvm = qubes.VMProperty(
  634. 'clockvm', load_stage=3,
  635. default=None, allow_none=True,
  636. doc='Which VM to use as NTP proxy for updating '
  637. 'AdminVM')
  638. default_kernel = qubes.property(
  639. 'default_kernel', load_stage=3,
  640. doc='Which kernel to use when not overriden in VM')
  641. default_dispvm = qubes.VMProperty(
  642. 'default_dispvm',
  643. load_stage=3,
  644. default=None,
  645. doc='Default DispVM base for service calls',
  646. allow_none=True)
  647. management_dispvm = qubes.VMProperty(
  648. 'management_dispvm',
  649. load_stage=3,
  650. default=None,
  651. doc='Default DispVM base for managing VMs',
  652. allow_none=True)
  653. default_pool = qubes.property(
  654. 'default_pool',
  655. load_stage=3,
  656. default=_default_pool,
  657. setter=_setter_pool,
  658. doc='Default storage pool')
  659. default_pool_private = qubes.property(
  660. 'default_pool_private',
  661. load_stage=3,
  662. default=lambda app: app.default_pool,
  663. setter=_setter_pool,
  664. doc='Default storage pool for private volumes')
  665. default_pool_root = qubes.property(
  666. 'default_pool_root',
  667. load_stage=3,
  668. default=lambda app: app.default_pool,
  669. setter=_setter_pool,
  670. doc='Default storage pool for root volumes')
  671. default_pool_volatile = qubes.property(
  672. 'default_pool_volatile',
  673. load_stage=3,
  674. default=lambda app: app.default_pool,
  675. setter=_setter_pool,
  676. doc='Default storage pool for volatile volumes')
  677. default_pool_kernel = qubes.property(
  678. 'default_pool_kernel',
  679. load_stage=3,
  680. default=lambda app: app.default_pool,
  681. setter=_setter_pool,
  682. doc='Default storage pool for kernel volumes')
  683. default_qrexec_timeout = qubes.property(
  684. 'default_qrexec_timeout',
  685. load_stage=3,
  686. default=60,
  687. type=int,
  688. doc="""Default time in seconds after which qrexec connection attempt
  689. is deemed failed""")
  690. default_shutdown_timeout = qubes.property(
  691. 'default_shutdown_timeout',
  692. load_stage=3,
  693. default=60,
  694. type=int,
  695. doc="""Default time in seconds for VM shutdown to complete""")
  696. stats_interval = qubes.property(
  697. 'stats_interval',
  698. load_stage=3,
  699. default=3,
  700. type=int,
  701. doc='Interval in seconds for VM stats reporting (memory, CPU usage)')
  702. # TODO #1637 #892
  703. check_updates_vm = qubes.property(
  704. 'check_updates_vm',
  705. type=bool,
  706. setter=qubes.property.bool,
  707. load_stage=3,
  708. default=True,
  709. doc='Check for updates inside qubes')
  710. def __init__(self, store=None, load=True, offline_mode=None, lock=False,
  711. **kwargs):
  712. #: logger instance for logging global messages
  713. self.log = logging.getLogger('app')
  714. self.log.debug('init() -> %#x', id(self))
  715. self.log.debug('stack:')
  716. for frame in traceback.extract_stack():
  717. self.log.debug('%s', frame)
  718. self._extensions = qubes.ext.get_extensions()
  719. #: collection of all VMs managed by this Qubes instance
  720. self.domains = VMCollection(self)
  721. #: collection of all available labels for VMs
  722. self.labels = {}
  723. #: collection of all pools
  724. self.pools = {}
  725. #: Connection to VMM
  726. self.vmm = VMMConnection(
  727. offline_mode=offline_mode,
  728. libvirt_reconnect_cb=self.register_event_handlers)
  729. #: Information about host system
  730. self.host = QubesHost(self)
  731. if store is not None:
  732. self._store = store
  733. else:
  734. self._store = os.environ.get('QUBES_XML_PATH',
  735. os.path.join(
  736. qubes.config.qubes_base_dir,
  737. qubes.config.system_path[
  738. 'qubes_store_filename']))
  739. super().__init__(xml=None, **kwargs)
  740. self.__load_timestamp = None
  741. self.__locked_fh = None
  742. self._domain_event_callback_id = None
  743. #: jinja2 environment for libvirt XML templates
  744. self.env = jinja2.Environment(
  745. loader=jinja2.FileSystemLoader([
  746. '/etc/qubes/templates',
  747. '/usr/share/qubes/templates',
  748. ]),
  749. undefined=jinja2.StrictUndefined)
  750. if load:
  751. self.load(lock=lock)
  752. self.events_enabled = True
  753. @property
  754. def store(self):
  755. return self._store
  756. def _migrate_global_properties(self):
  757. """Migrate renamed/dropped properties"""
  758. if self.xml is None:
  759. return
  760. # drop default_fw_netvm
  761. node_default_fw_netvm = self.xml.find(
  762. './properties/property[@name=\'default_fw_netvm\']')
  763. if node_default_fw_netvm is not None:
  764. node_default_netvm = self.xml.find(
  765. './properties/property[@name=\'default_netvm\']')
  766. try:
  767. default_fw_netvm = self.domains[node_default_fw_netvm.text]
  768. if node_default_netvm is None:
  769. default_netvm = None
  770. else:
  771. default_netvm = self.domains[node_default_netvm.text]
  772. if default_netvm != default_fw_netvm:
  773. for vm in self.domains:
  774. if not hasattr(vm, 'netvm'):
  775. continue
  776. if not getattr(vm, 'provides_network', False):
  777. continue
  778. node_netvm = vm.xml.find(
  779. './properties/property[@name=\'netvm\']')
  780. if node_netvm is not None:
  781. # non-default netvm
  782. continue
  783. # this will unfortunately break "being default"
  784. # property state, but the alternative (changing
  785. # value behind user's back) is worse
  786. properties = vm.xml.find('./properties')
  787. element = lxml.etree.Element('property',
  788. name='netvm')
  789. element.text = default_fw_netvm.name
  790. # manipulate xml directly, before loading netvm
  791. # property, to avoid hitting netvm loop detection
  792. properties.append(element)
  793. except KeyError:
  794. # if default_fw_netvm was set to invalid value, simply
  795. # drop it
  796. pass
  797. node_default_fw_netvm.getparent().remove(node_default_fw_netvm)
  798. def _migrate_labels(self):
  799. """Migrate changed labels"""
  800. if self.xml is None:
  801. return
  802. # fix grey being green
  803. grey_label = self.xml.find('./labels/label[@color=\'0x555753\']')
  804. if grey_label is not None:
  805. grey_label.set('color', '0x555555')
  806. def load(self, lock=False):
  807. """Open qubes.xml
  808. :throws EnvironmentError: failure on parsing store
  809. :throws xml.parsers.expat.ExpatError: failure on parsing store
  810. :raises lxml.etree.XMLSyntaxError: on syntax error in qubes.xml
  811. """
  812. fh = self._acquire_lock()
  813. self.xml = lxml.etree.parse(fh)
  814. self._migrate_labels()
  815. # stage 1: load labels and pools
  816. for node in self.xml.xpath('./labels/label'):
  817. label = qubes.Label.fromxml(node)
  818. self.labels[label.index] = label
  819. for node in self.xml.xpath('./pools/pool'):
  820. name = node.get('name')
  821. assert name, "Pool name '%s' is invalid " % name
  822. try:
  823. self.pools[name] = self._get_pool(**node.attrib)
  824. except qubes.exc.QubesException as e:
  825. self.log.error(str(e))
  826. # stage 2: load VMs
  827. for node in self.xml.xpath('./domains/domain'):
  828. # pylint: disable=no-member
  829. cls = self.get_vm_class(node.get('class'))
  830. vm = cls(self, node)
  831. vm.load_properties(load_stage=2)
  832. vm.init_log()
  833. self.domains.add(vm, _enable_events=False)
  834. if 0 not in self.domains:
  835. self.domains.add(
  836. qubes.vm.adminvm.AdminVM(self, None),
  837. _enable_events=False)
  838. self._migrate_global_properties()
  839. # stage 3: load global properties
  840. self.load_properties(load_stage=3)
  841. # stage 4: fill all remaining VM properties
  842. for vm in self.domains:
  843. vm.load_properties(load_stage=4)
  844. vm.load_extras()
  845. # stage 5: misc fixups
  846. self.property_require('default_guivm', allow_none=True)
  847. self.property_require('default_netvm', allow_none=True)
  848. self.property_require('default_template', allow_none=True)
  849. self.property_require('clockvm', allow_none=True)
  850. self.property_require('updatevm', allow_none=True)
  851. for vm in self.domains:
  852. vm.events_enabled = True
  853. vm.fire_event('domain-load')
  854. # get a file timestamp (before closing it - still holding the lock!),
  855. # to detect whether anyone else have modified it in the meantime
  856. self.__load_timestamp = os.path.getmtime(self._store)
  857. if not lock:
  858. self._release_lock()
  859. def __xml__(self):
  860. element = lxml.etree.Element('qubes')
  861. element.append(self.xml_labels())
  862. pools_xml = lxml.etree.Element('pools')
  863. for pool in self.pools.values():
  864. xml = pool.__xml__()
  865. if xml is not None:
  866. pools_xml.append(xml)
  867. element.append(pools_xml)
  868. element.append(self.xml_properties())
  869. domains = lxml.etree.Element('domains')
  870. for vm in self.domains:
  871. domains.append(vm.__xml__())
  872. element.append(domains)
  873. return element
  874. def __str__(self):
  875. return type(self).__name__
  876. def save(self, lock=True):
  877. """Save all data to qubes.xml
  878. There are several problems with saving :file:`qubes.xml` which must be
  879. mitigated:
  880. - Running out of disk space. No space left should not result in empty
  881. file. This is done by writing to temporary file and then renaming.
  882. - Attempts to write two or more files concurrently. This is done by
  883. sophisticated locking.
  884. :param bool lock: keep file locked after saving
  885. :throws EnvironmentError: failure on saving
  886. """
  887. if not self.__locked_fh:
  888. self._acquire_lock(for_save=True)
  889. fh_new = tempfile.NamedTemporaryFile(
  890. prefix=self._store, delete=False)
  891. lxml.etree.ElementTree(self.__xml__()).write(
  892. fh_new, encoding='utf-8', pretty_print=True)
  893. fh_new.flush()
  894. try:
  895. os.chown(fh_new.name, -1, grp.getgrnam('qubes').gr_gid)
  896. os.chmod(fh_new.name, 0o660)
  897. except KeyError: # group 'qubes' not found
  898. # don't change mode if no 'qubes' group in the system
  899. pass
  900. os.rename(fh_new.name, self._store)
  901. # update stored mtime, in case of multiple save() calls without
  902. # loading qubes.xml again
  903. self.__load_timestamp = os.path.getmtime(self._store)
  904. # this releases lock for all other processes,
  905. # but they should instantly block on the new descriptor
  906. self.__locked_fh.close()
  907. self.__locked_fh = fh_new
  908. if not lock:
  909. self._release_lock()
  910. def close(self):
  911. """Deconstruct the object and break circular references
  912. After calling this the object is unusable, not even for saving."""
  913. self.log.debug('close() <- %#x', id(self))
  914. for frame in traceback.extract_stack():
  915. self.log.debug('%s', frame)
  916. # let all the extension cleanup things
  917. self.fire_event('qubes-close')
  918. super().close()
  919. if self._domain_event_callback_id is not None:
  920. self.vmm.libvirt_conn.domainEventDeregisterAny(
  921. self._domain_event_callback_id)
  922. self._domain_event_callback_id = None
  923. # Only our Lord, The God Almighty, knows what references
  924. # are kept in extensions.
  925. # NOTE: this doesn't really delete extension objects - Extension class
  926. # saves reference to instance, and also various registered (class level)
  927. # event handlers do that too
  928. del self._extensions
  929. for vm in self.domains:
  930. vm.close()
  931. self.domains.close()
  932. del self.domains
  933. self.vmm.close()
  934. del self.vmm
  935. del self.host
  936. if self.__locked_fh:
  937. self._release_lock()
  938. def _acquire_lock(self, for_save=False):
  939. assert self.__locked_fh is None, 'double lock'
  940. while True:
  941. try:
  942. fd = os.open(self._store,
  943. os.O_RDWR | (os.O_CREAT * int(for_save)))
  944. except FileNotFoundError:
  945. if not for_save:
  946. raise qubes.exc.QubesException(
  947. 'Qubes XML store {!r} is missing; '
  948. 'use qubes-create tool'.format(self._store))
  949. raise
  950. # While we were waiting for lock, someone could have unlink()ed
  951. # (or rename()d) our file out of the filesystem. We have to
  952. # ensure we got lock on something linked to filesystem.
  953. # If not, try again.
  954. if os.fstat(fd) != os.stat(self._store):
  955. os.close(fd)
  956. continue
  957. if self.__load_timestamp and \
  958. os.path.getmtime(self._store) != self.__load_timestamp:
  959. os.close(fd)
  960. raise qubes.exc.QubesException(
  961. 'Someone else modified qubes.xml in the meantime')
  962. break
  963. if os.name == 'posix':
  964. fcntl.lockf(fd, fcntl.LOCK_EX)
  965. elif os.name == 'nt':
  966. # pylint: disable=protected-access
  967. overlapped = pywintypes.OVERLAPPED()
  968. win32file.LockFileEx(
  969. win32file._get_osfhandle(fd),
  970. win32con.LOCKFILE_EXCLUSIVE_LOCK, 0, -0x10000, overlapped)
  971. self.__locked_fh = os.fdopen(fd, 'r+b')
  972. return self.__locked_fh
  973. def _release_lock(self):
  974. assert self.__locked_fh is not None, 'double release'
  975. # intentionally do not call explicit unlock to not unlock the file
  976. # before all buffers are flushed
  977. self.__locked_fh.close()
  978. self.__locked_fh = None
  979. def load_initial_values(self):
  980. self.labels = {
  981. 1: qubes.Label(1, '0xcc0000', 'red'),
  982. 2: qubes.Label(2, '0xf57900', 'orange'),
  983. 3: qubes.Label(3, '0xedd400', 'yellow'),
  984. 4: qubes.Label(4, '0x73d216', 'green'),
  985. 5: qubes.Label(5, '0x555555', 'gray'),
  986. 6: qubes.Label(6, '0x3465a4', 'blue'),
  987. 7: qubes.Label(7, '0x75507b', 'purple'),
  988. 8: qubes.Label(8, '0x000000', 'black'),
  989. }
  990. assert max(self.labels.keys()) == qubes.config.max_default_label
  991. pool_configs = copy.deepcopy(qubes.config.defaults['pool_configs'])
  992. for name, config in pool_configs.items():
  993. if 'driver' not in config and 'dir_path' in config:
  994. config['driver'] = 'file'
  995. try:
  996. os.makedirs(config['dir_path'], exist_ok=True)
  997. if qubes.storage.reflink.is_supported(config['dir_path']):
  998. config['driver'] = 'file-reflink'
  999. config['setup_check'] = False # don't check twice
  1000. except PermissionError: # looks like a testing environment
  1001. pass # stay with 'file'
  1002. self.pools[name] = self._get_pool(**config)
  1003. self.default_pool_kernel = 'linux-kernel'
  1004. self.domains.add(
  1005. qubes.vm.adminvm.AdminVM(self, None, label='black'))
  1006. @classmethod
  1007. def create_empty_store(cls, *args, **kwargs):
  1008. self = cls(*args, load=False, **kwargs)
  1009. if os.path.exists(self.store):
  1010. raise qubes.exc.QubesException(
  1011. '{} already exists, aborting'.format(self.store))
  1012. self.load_initial_values()
  1013. # TODO py3 get lock= as keyword-only arg
  1014. self.save(kwargs.get('lock'))
  1015. return self
  1016. def xml_labels(self):
  1017. """Serialise labels
  1018. :rtype: lxml.etree._Element
  1019. """
  1020. labels = lxml.etree.Element('labels')
  1021. for label in sorted(self.labels.values(), key=lambda labl: labl.index):
  1022. labels.append(label.__xml__())
  1023. return labels
  1024. @staticmethod
  1025. def get_vm_class(clsname):
  1026. """Find the class for a domain.
  1027. Classes are registered as setuptools' entry points in ``qubes.vm``
  1028. group. Any package may supply their own classes.
  1029. :param str clsname: name of the class
  1030. :return type: class
  1031. """
  1032. try:
  1033. return qubes.utils.get_entry_point_one(
  1034. qubes.vm.VM_ENTRY_POINT, clsname)
  1035. except KeyError:
  1036. raise qubes.exc.QubesException(
  1037. 'no such VM class: {!r}'.format(clsname))
  1038. # don't catch TypeError
  1039. def add_new_vm(self, cls, qid=None, **kwargs):
  1040. """Add new Virtual Machine to collection
  1041. """
  1042. if qid is None:
  1043. qid = self.domains.get_new_unused_qid()
  1044. if isinstance(cls, str):
  1045. cls = self.get_vm_class(cls)
  1046. # handle default template; specifically allow template=None (do not
  1047. # override it with default template)
  1048. if 'template' not in kwargs and hasattr(cls, 'template'):
  1049. if cls == self.get_vm_class('DispVM'):
  1050. kwargs['template'] = self.default_dispvm
  1051. else:
  1052. kwargs['template'] = self.default_template
  1053. if kwargs['template'] is None:
  1054. raise qubes.exc.QubesValueError(
  1055. 'Template for the qube not specified, nor default '
  1056. 'template set.')
  1057. elif 'template' in kwargs and isinstance(kwargs['template'], str):
  1058. kwargs['template'] = self.domains[kwargs['template']]
  1059. return self.domains.add(cls(self, None, qid=qid, **kwargs))
  1060. def get_label(self, label):
  1061. """Get label as identified by index or name
  1062. :throws KeyError: when label is not found
  1063. """
  1064. # first search for index, verbatim
  1065. with suppress(KeyError):
  1066. return self.labels[label]
  1067. # then search for name
  1068. for i in self.labels.values():
  1069. if i.name == label:
  1070. return i
  1071. # last call, if label is a number represented as str, search in indices
  1072. with suppress(KeyError, ValueError):
  1073. return self.labels[int(label)]
  1074. raise qubes.exc.QubesLabelNotFoundError(label)
  1075. @asyncio.coroutine
  1076. def setup_pools(self):
  1077. """ Run implementation specific setup for each storage pool. """
  1078. yield from qubes.utils.void_coros_maybe(
  1079. pool.setup() for pool in self.pools.values())
  1080. @asyncio.coroutine
  1081. def add_pool(self, name, **kwargs):
  1082. """ Add a storage pool to config."""
  1083. if name in self.pools.keys():
  1084. raise qubes.exc.QubesException('pool named %s already exists \n' %
  1085. name)
  1086. kwargs['name'] = name
  1087. pool = self._get_pool(**kwargs)
  1088. yield from qubes.utils.coro_maybe(pool.setup())
  1089. self.pools[name] = pool
  1090. yield from self.fire_event_async('pool-add', pool=pool)
  1091. return pool
  1092. @asyncio.coroutine
  1093. def remove_pool(self, name):
  1094. """ Remove a storage pool from config file. """
  1095. try:
  1096. pool = self.pools[name]
  1097. volumes = [(vm, volume) for vm in self.domains
  1098. for volume in vm.volumes.values()
  1099. if volume.pool is pool]
  1100. if volumes:
  1101. raise qubes.exc.QubesPoolInUseError(pool)
  1102. prop_suffixes = ['', '_kernel', '_private', '_root', '_volatile']
  1103. for suffix in prop_suffixes:
  1104. if getattr(self, 'default_pool' + suffix, None) is pool:
  1105. raise qubes.exc.QubesPoolInUseError(
  1106. pool,
  1107. 'Storage pool is in use: '
  1108. 'set as {}'.format('default_pool' + suffix))
  1109. yield from self.fire_event_async('pool-pre-delete',
  1110. pre_event=True, pool=pool)
  1111. del self.pools[name]
  1112. yield from qubes.utils.coro_maybe(pool.destroy())
  1113. yield from self.fire_event_async('pool-delete', pool=pool)
  1114. except KeyError:
  1115. return
  1116. def get_pool(self, pool):
  1117. """ Returns a :py:class:`qubes.storage.Pool` instance """
  1118. if isinstance(pool, qubes.storage.Pool):
  1119. return pool
  1120. try:
  1121. return self.pools[pool]
  1122. except KeyError:
  1123. raise qubes.exc.QubesException('Unknown storage pool ' + pool)
  1124. @staticmethod
  1125. def _get_pool(**kwargs):
  1126. try:
  1127. name = kwargs['name']
  1128. assert name, 'Name needs to be an non empty string'
  1129. except KeyError:
  1130. raise qubes.exc.QubesException('No pool name for pool')
  1131. try:
  1132. driver = kwargs['driver']
  1133. except KeyError:
  1134. raise qubes.exc.QubesException('No driver specified for pool ' +
  1135. name)
  1136. try:
  1137. klass = qubes.utils.get_entry_point_one(
  1138. qubes.storage.STORAGE_ENTRY_POINT, driver)
  1139. del kwargs['driver']
  1140. return klass(**kwargs)
  1141. except KeyError:
  1142. raise qubes.exc.QubesException('No driver %s for pool %s' %
  1143. (driver, name))
  1144. def register_event_handlers(self, old_connection=None):
  1145. """Register libvirt event handlers, which will translate libvirt
  1146. events into qubes.events. This function should be called only in
  1147. 'qubesd' process and only when mainloop has been already set.
  1148. """
  1149. if old_connection:
  1150. try:
  1151. old_connection.domainEventDeregisterAny(
  1152. self._domain_event_callback_id)
  1153. except libvirt.libvirtError:
  1154. # the connection is probably in a bad state; but call the above
  1155. # anyway to cleanup the client structures
  1156. pass
  1157. self._domain_event_callback_id = (
  1158. self.vmm.libvirt_conn.domainEventRegisterAny(
  1159. None, # any domain
  1160. libvirt.VIR_DOMAIN_EVENT_ID_LIFECYCLE,
  1161. self._domain_event_callback,
  1162. None))
  1163. def _domain_event_callback(self, _conn, domain, event, _detail, _opaque):
  1164. """Generic libvirt event handler (virConnectDomainEventCallback),
  1165. translate libvirt event into qubes.events.
  1166. """
  1167. if not self.events_enabled:
  1168. return
  1169. try:
  1170. vm = self.domains[domain.name()]
  1171. except KeyError:
  1172. # ignore events for unknown domains
  1173. return
  1174. if event == libvirt.VIR_DOMAIN_EVENT_STOPPED:
  1175. vm.on_libvirt_domain_stopped()
  1176. elif event == libvirt.VIR_DOMAIN_EVENT_SUSPENDED:
  1177. try:
  1178. vm.fire_event('domain-paused')
  1179. except Exception: # pylint: disable=broad-except
  1180. self.log.exception(
  1181. 'Uncaught exception from domain-paused handler '
  1182. 'for domain %s', vm.name)
  1183. elif event == libvirt.VIR_DOMAIN_EVENT_RESUMED:
  1184. try:
  1185. vm.fire_event('domain-unpaused')
  1186. except Exception: # pylint: disable=broad-except
  1187. self.log.exception(
  1188. 'Uncaught exception from domain-unpaused handler '
  1189. 'for domain %s', vm.name)
  1190. @qubes.events.handler('domain-pre-delete')
  1191. def on_domain_pre_deleted(self, event, vm):
  1192. # pylint: disable=unused-argument
  1193. for obj in itertools.chain(self.domains, (self,)):
  1194. if obj is vm:
  1195. # allow removed VM to reference itself
  1196. continue
  1197. for prop in obj.property_list():
  1198. with suppress(AttributeError):
  1199. if isinstance(prop, qubes.vm.VMProperty) and \
  1200. getattr(obj, prop.__name__) == vm:
  1201. self.log.error(
  1202. 'Cannot remove %s, used by %s.%s',
  1203. vm, obj, prop.__name__)
  1204. raise qubes.exc.QubesVMInUseError(
  1205. vm,
  1206. 'Domain is in use: {!r};'
  1207. 'see /var/log/qubes/qubes.log in dom0 for '
  1208. 'details'.format(
  1209. vm.name))
  1210. assignments = vm.get_provided_assignments()
  1211. if assignments:
  1212. desc = ', '.join(
  1213. assignment.ident for assignment in assignments)
  1214. raise qubes.exc.QubesVMInUseError(
  1215. vm,
  1216. 'VM has devices attached persistently to other VMs: ' +
  1217. desc)
  1218. @qubes.events.handler('domain-delete')
  1219. def on_domain_deleted(self, event, vm):
  1220. # pylint: disable=unused-argument
  1221. for propname in (
  1222. 'default_guivm'
  1223. 'default_netvm',
  1224. 'default_fw_netvm',
  1225. 'clockvm',
  1226. 'updatevm',
  1227. 'default_template',
  1228. ):
  1229. with suppress(AttributeError):
  1230. if getattr(self, propname) == vm:
  1231. delattr(self, propname)
  1232. @qubes.events.handler('property-pre-set:clockvm')
  1233. def on_property_pre_set_clockvm(self, event, name, newvalue, oldvalue=None):
  1234. # pylint: disable=unused-argument,no-self-use
  1235. if newvalue is None:
  1236. return
  1237. if 'service.clocksync' not in newvalue.features:
  1238. newvalue.features['service.clocksync'] = True
  1239. @qubes.events.handler('property-set:clockvm')
  1240. def on_property_set_clockvm(self, event, name, newvalue, oldvalue=None):
  1241. # pylint: disable=unused-argument,no-self-use
  1242. if oldvalue == newvalue:
  1243. return
  1244. if oldvalue and oldvalue.features.get('service.clocksync', False):
  1245. del oldvalue.features['service.clocksync']
  1246. @qubes.events.handler('property-pre-set:default_netvm')
  1247. def on_property_pre_set_default_netvm(self, event, name, newvalue,
  1248. oldvalue=None):
  1249. # pylint: disable=unused-argument,invalid-name
  1250. if newvalue is not None and oldvalue is not None \
  1251. and oldvalue.is_running() and not newvalue.is_running() \
  1252. and self.domains.get_vms_connected_to(oldvalue):
  1253. raise qubes.exc.QubesVMNotRunningError(
  1254. newvalue,
  1255. 'Cannot change {!r} to domain that '
  1256. 'is not running ({!r}).'.format(
  1257. name, newvalue.name))
  1258. @qubes.events.handler('property-set:default_netvm')
  1259. def on_property_set_default_netvm(self, event, name, newvalue,
  1260. oldvalue=None):
  1261. # pylint: disable=unused-argument
  1262. for vm in self.domains:
  1263. if hasattr(vm, 'provides_network') and not vm.provides_network and \
  1264. hasattr(vm, 'netvm') and vm.property_is_default('netvm'):
  1265. # fire property-reset:netvm as it is responsible for resetting
  1266. # netvm to it's default value
  1267. vm.fire_event('property-reset:netvm',
  1268. name='netvm', oldvalue=oldvalue)
  1269. @qubes.events.handler('property-set:default_dispvm')
  1270. def on_property_set_default_dispvm(self, event, name, newvalue,
  1271. oldvalue=None):
  1272. # pylint: disable=unused-argument
  1273. for vm in self.domains:
  1274. if hasattr(vm, 'default_dispvm') and \
  1275. vm.property_is_default('default_dispvm'):
  1276. # fire property-reset:default_dispvm as it is responsible for
  1277. # resetting dispvm to it's default value
  1278. vm.fire_event('property-reset:default_dispvm',
  1279. name='default_dispvm', oldvalue=oldvalue)