core-admin/qubes/ext
Marek Marczykowski-Górecki 3f96c72ee3
api/admin: (ext/admin) limit listing VMs based on qrexec policy
Various Admin API calls, when directed at dom0, retrieve global system
view instead of a specific VM. This applies to admin.vm.List (called at
dom0 retrieve full VM list) and admin.Events (called at dom0 listen for
events of all the VMs). This makes it tricky to configure a management
VM with access to limited set of VMs only, because many tools require
ability to list VMs, and that would return full list.

Fix this issue by adding a filter to admin.vm.List and admin.Events
calls (using event handlers in AdminExtension) that filters the output
using qrexec policy. This version evaluates policy for each VM or event
(but loads only once). If the performance will be an issue, it can be
optimized later.

Fixes QubesOS/qubes-issues#5509
2020-03-28 03:23:28 +01:00
..
__init__.py Fix issues found by pylint 2.0 2018-07-15 23:51:15 +02:00
admin.py api/admin: (ext/admin) limit listing VMs based on qrexec policy 2020-03-28 03:23:28 +01:00
audio.py audio/gui: use simply vm.tags instead of list() 2020-03-08 17:07:29 +01:00
block.py ext/block: prefer connecting cdrom as xvdd 2019-11-19 14:03:21 +01:00
core_features.py Support qubes.VMExec call 2020-01-24 16:57:13 +01:00
gui.py audio/gui: use simply vm.tags instead of list() 2020-03-08 17:07:29 +01:00
pci.py ext/pci: handle 'qubes-close' event 2020-01-11 03:54:30 +01:00
qubesmanager.py Change license to LGPL v2.1+ 2017-10-12 00:11:50 +02:00
r3compatibility.py Do not generate R3 compat firewall rules if R4 format is supported 2018-10-15 06:05:05 +02:00
services.py Ensure empty service value delete /var/run/qubes-service/ file 2020-03-08 23:08:48 +01:00
windows.py factor out utils.coro_maybe() 2019-06-28 10:29:24 +00:00