80b459b6d5
- kernel volume shouldn't have snap_on_start, it's read-only volume anyway - root volume of AppVM should have placeholder for 'source' - private volume of AppVM should _not_ have placeholder for 'source' (it's ignored anyway, because snap_on_start=False) QubesOS/qubes-issues#2256
165 lines
5.9 KiB
Python
165 lines
5.9 KiB
Python
#
|
|
# The Qubes OS Project, http://www.qubes-os.org
|
|
#
|
|
# Copyright (C) 2014-2016 Wojtek Porczyk <woju@invisiblethingslab.com>
|
|
# Copyright (C) 2016 Marek Marczykowski <marmarek@invisiblethingslab.com>)
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License along
|
|
# with this program; if not, write to the Free Software Foundation, Inc.,
|
|
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
#
|
|
|
|
''' A disposable vm implementation '''
|
|
|
|
import copy
|
|
|
|
import qubes.vm.qubesvm
|
|
import qubes.vm.appvm
|
|
import qubes.config
|
|
|
|
class DispVM(qubes.vm.qubesvm.QubesVM):
|
|
'''Disposable VM'''
|
|
|
|
template = qubes.VMProperty('template',
|
|
load_stage=4,
|
|
vmclass=qubes.vm.appvm.AppVM,
|
|
doc='AppVM, on which this DispVM is based.')
|
|
|
|
dispid = qubes.property('dispid', type=int, write_once=True,
|
|
clone=False,
|
|
doc='''Internal, persistent identifier of particular DispVM.''')
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
self.volume_config = {
|
|
'root': {
|
|
'name': 'root',
|
|
'pool': 'default',
|
|
'snap_on_start': True,
|
|
'save_on_stop': False,
|
|
'rw': False,
|
|
'internal': True
|
|
},
|
|
'private': {
|
|
'name': 'private',
|
|
'pool': 'default',
|
|
'snap_on_start': True,
|
|
'save_on_stop': False,
|
|
'internal': True,
|
|
'rw': True,
|
|
},
|
|
'volatile': {
|
|
'name': 'volatile',
|
|
'pool': 'default',
|
|
'internal': True,
|
|
'rw': True,
|
|
'size': qubes.config.defaults['root_img_size'] +
|
|
qubes.config.defaults['private_img_size'],
|
|
},
|
|
'kernel': {
|
|
'name': 'kernel',
|
|
'pool': 'linux-kernel',
|
|
'rw': False,
|
|
'internal': True
|
|
}
|
|
}
|
|
if 'name' not in kwargs and 'dispid' in kwargs:
|
|
kwargs['name'] = 'disp' + str(kwargs['dispid'])
|
|
template = kwargs.get('template', None)
|
|
|
|
if template is not None:
|
|
# template is only passed if the AppVM is created, in other cases we
|
|
# don't need to patch the volume_config because the config is
|
|
# coming from XML, already as we need it
|
|
|
|
for name, conf in self.volume_config.items():
|
|
tpl_volume = template.volumes[name]
|
|
self.config_volume_from_source(conf, tpl_volume)
|
|
|
|
for name, config in template.volume_config.items():
|
|
# in case the template vm has more volumes add them to own
|
|
# config
|
|
if name not in self.volume_config:
|
|
self.volume_config[name] = copy.deepcopy(config)
|
|
if 'vid' in self.volume_config[name]:
|
|
del self.volume_config[name]['vid']
|
|
|
|
# by default inherit label from the DispVM template
|
|
if 'label' not in kwargs:
|
|
kwargs['label'] = template.label
|
|
|
|
super(DispVM, self).__init__(*args, **kwargs)
|
|
|
|
@qubes.events.handler('domain-load')
|
|
def on_domain_loaded(self, event):
|
|
''' When domain is loaded assert that this vm has a template.
|
|
''' # pylint: disable=unused-argument
|
|
assert self.template
|
|
|
|
@qubes.events.handler('property-pre-set:template')
|
|
def on_property_pre_set_template(self, event, name, newvalue,
|
|
oldvalue=None):
|
|
''' Disposable VM cannot have template changed '''
|
|
# pylint: disable=unused-argument
|
|
raise qubes.exc.QubesValueError(self,
|
|
'Cannot change template of Disposable VM')
|
|
|
|
@classmethod
|
|
def from_appvm(cls, appvm, **kwargs):
|
|
'''Create a new instance from given AppVM
|
|
|
|
:param qubes.vm.appvm.AppVM appvm: template from which the VM should \
|
|
be created
|
|
:returns: new disposable vm
|
|
|
|
*kwargs* are passed to the newly created VM
|
|
|
|
>>> import qubes.vm.dispvm.DispVM
|
|
>>> dispvm = qubes.vm.dispvm.DispVM.from_appvm(appvm).start()
|
|
>>> dispvm.run_service('qubes.VMShell', input='firefox')
|
|
>>> dispvm.cleanup()
|
|
|
|
This method modifies :file:`qubes.xml` file.
|
|
The qube returned is not started.
|
|
'''
|
|
if not appvm.dispvm_allowed:
|
|
raise qubes.exc.QubesException(
|
|
'Refusing to start DispVM out of this AppVM, because '
|
|
'dispvm_allowed=False')
|
|
app = appvm.app
|
|
dispvm = app.add_new_vm(
|
|
cls,
|
|
dispid=app.domains.get_new_unused_dispid(),
|
|
template=app.domains[appvm],
|
|
**kwargs)
|
|
# exclude template
|
|
proplist = [prop for prop in dispvm.property_list()
|
|
if prop.clone and prop.__name__ not in ['template']]
|
|
dispvm.clone_properties(app.domains[appvm], proplist=proplist)
|
|
dispvm.create_on_disk()
|
|
app.save()
|
|
return dispvm
|
|
|
|
def cleanup(self):
|
|
'''Clean up after the DispVM
|
|
|
|
This stops the disposable qube and removes it from the store.
|
|
This method modifies :file:`qubes.xml` file.
|
|
'''
|
|
try:
|
|
self.force_shutdown()
|
|
except qubes.exc.QubesVMNotStartedError:
|
|
pass
|
|
self.remove_from_disk()
|
|
del self.app.domains[self]
|
|
self.app.save()
|