
This makes easier to import right objects in submodules (only one object). This also implement lazy connection - at first access, not at module import, which speeds up tools, which doesn't need runtime information (like qvm-prefs or qvm-service). In the future this will ease migration from xenstore to QubesDB. Also implement "offline mode" - operate on qubes.xml without connecting to VMM - raise exception at such try. This is needed to run tools during installation, where only minimal set of services are started, especially no libvirt.
96 lines
2.6 KiB
Python
96 lines
2.6 KiB
Python
#!/usr/bin/python2
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
# The Qubes OS Project, http://www.qubes-os.org
|
|
#
|
|
# Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
|
|
# Copyright (C) 2013 Marek Marczykowski <marmarek@invisiblethingslab.com>
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
#
|
|
|
|
from qubes.qubes import QubesNetVm,register_qubes_vm_class
|
|
from qubes.qubes import defaults
|
|
from qubes.qubes import QubesException,dry_run,vmm
|
|
import psutil
|
|
|
|
class QubesAdminVm(QubesNetVm):
|
|
|
|
# In which order load this VM type from qubes.xml
|
|
load_order = 10
|
|
|
|
def __init__(self, **kwargs):
|
|
super(QubesAdminVm, self).__init__(qid=0, name="dom0", netid=0,
|
|
dir_path=None,
|
|
private_img = None,
|
|
template = None,
|
|
label = defaults["template_label"],
|
|
**kwargs)
|
|
|
|
@property
|
|
def xid(self):
|
|
return 0
|
|
|
|
@property
|
|
def libvirt_domain(self):
|
|
return None
|
|
|
|
@property
|
|
def type(self):
|
|
return "AdminVM"
|
|
|
|
def is_running(self):
|
|
return True
|
|
|
|
def get_power_state(self):
|
|
return "Running"
|
|
|
|
def get_mem(self):
|
|
return psutil.virtual_memory().total/1024
|
|
|
|
def get_mem_static_max(self):
|
|
return vmm.libvirt_conn.getInfo()[1]
|
|
|
|
def get_disk_usage(self, file_or_dir):
|
|
return 0
|
|
|
|
def get_disk_utilization(self):
|
|
return 0
|
|
|
|
def get_disk_utilization_private_img(self):
|
|
return 0
|
|
|
|
def get_private_img_sz(self):
|
|
return 0
|
|
|
|
@property
|
|
def ip(self):
|
|
return "10.137.0.2"
|
|
|
|
def start(self, **kwargs):
|
|
raise QubesException ("Cannot start Dom0 fake domain!")
|
|
|
|
def suspend(self):
|
|
return
|
|
|
|
def create_xml_element(self):
|
|
return None
|
|
|
|
def verify_files(self):
|
|
return True
|
|
|
|
register_qubes_vm_class(QubesAdminVm)
|