143 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			143 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| #
 | |
| # The Qubes OS Project, https://www.qubes-os.org/
 | |
| #
 | |
| # Copyright (C) 2010-2016  Joanna Rutkowska <joanna@invisiblethingslab.com>
 | |
| # Copyright (C) 2013-2016  Marek Marczykowski-Górecki
 | |
| #                              <marmarek@invisiblethingslab.com>
 | |
| # Copyright (C) 2014-2018  Wojtek Porczyk <woju@invisiblethingslab.com>
 | |
| # Copyright (C) 2019 Frédéric Pierret <frederic.pierret@qubes-os.org>
 | |
| #
 | |
| # This library is free software; you can redistribute it and/or
 | |
| # modify it under the terms of the GNU Lesser General Public
 | |
| # License as published by the Free Software Foundation; either
 | |
| # version 2.1 of the License, or (at your option) any later version.
 | |
| #
 | |
| # This library is distributed in the hope that it will be useful,
 | |
| # but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
| # Lesser General Public License for more details.
 | |
| #
 | |
| # You should have received a copy of the GNU Lesser General Public
 | |
| # License along with this library; if not, see <https://www.gnu.org/licenses/>.
 | |
| #
 | |
| 
 | |
| import asyncio
 | |
| import qubes.config
 | |
| import qubes.ext
 | |
| import qubes.exc
 | |
| 
 | |
| 
 | |
| class GUI(qubes.ext.Extension):
 | |
|     # pylint: disable=too-few-public-methods,unused-argument,no-self-use
 | |
|     @staticmethod
 | |
|     def attached_vms(vm):
 | |
|         for domain in vm.app.domains:
 | |
|             if getattr(domain, 'guivm', None) and domain.guivm == vm:
 | |
|                 yield domain
 | |
| 
 | |
|     @qubes.ext.handler('domain-pre-shutdown')
 | |
|     def on_domain_pre_shutdown(self, vm, event, **kwargs):
 | |
|         attached_vms = [domain for domain in self.attached_vms(vm) if
 | |
|                         domain.is_running()]
 | |
|         if attached_vms and not kwargs.get('force', False):
 | |
|             raise qubes.exc.QubesVMError(
 | |
|                 self, 'There are running VMs using this VM as GuiVM: '
 | |
|                       '{}'.format(', '.join(vm.name for vm in attached_vms)))
 | |
| 
 | |
|     @staticmethod
 | |
|     def send_gui_mode(vm):
 | |
|         vm.run_service('qubes.SetGuiMode',
 | |
|                        input=('SEAMLESS'
 | |
|                               if vm.features.get('gui-seamless', False)
 | |
|                               else 'FULLSCREEN'))
 | |
| 
 | |
|     @qubes.ext.handler('domain-init', 'domain-load')
 | |
|     def on_domain_init_load(self, vm, event):
 | |
|         if getattr(vm, 'guivm', None):
 | |
|             if 'guivm-' + vm.guivm.name not in vm.tags:
 | |
|                 self.on_property_set(vm, event, name='guivm', newvalue=vm.guivm)
 | |
| 
 | |
|     @qubes.ext.handler('property-reset:guivm')
 | |
|     def on_property_reset(self, subject, event, name, oldvalue=None):
 | |
|         newvalue = getattr(subject, 'guivm', None)
 | |
|         self.on_property_set(subject, event, name, newvalue, oldvalue)
 | |
| 
 | |
|     @qubes.ext.handler('property-set:guivm')
 | |
|     def on_property_set(self, subject, event, name, newvalue, oldvalue=None):
 | |
|         # Clean other 'guivm-XXX' tags.
 | |
|         # gui-daemon can connect to only one domain
 | |
|         tags_list = list(subject.tags)
 | |
|         for tag in tags_list:
 | |
|             if tag.startswith('guivm-'):
 | |
|                 subject.tags.remove(tag)
 | |
| 
 | |
|         if newvalue:
 | |
|             guivm = 'guivm-' + newvalue.name
 | |
|             subject.tags.add(guivm)
 | |
| 
 | |
|     @qubes.ext.handler('domain-qdb-create')
 | |
|     def on_domain_qdb_create(self, vm, event):
 | |
|         for feature in ('gui-videoram-overhead', 'gui-videoram-min'):
 | |
|             try:
 | |
|                 vm.untrusted_qdb.write(
 | |
|                     '/qubes-{}'.format(feature),
 | |
|                     vm.features.check_with_template_and_adminvm(
 | |
|                         feature))
 | |
|             except KeyError:
 | |
|                 pass
 | |
| 
 | |
|         # Add GuiVM Xen ID for gui-daemon
 | |
|         if getattr(vm, 'guivm', None):
 | |
|             if vm != vm.guivm:
 | |
|                 vm.untrusted_qdb.write('/keyboard-layout', vm.keyboard_layout)
 | |
| 
 | |
|                 if vm.guivm.is_running():
 | |
|                     vm.untrusted_qdb.write('/qubes-gui-domain-xid',
 | |
|                                            str(vm.guivm.xid))
 | |
| 
 | |
|         # Set GuiVM prefix
 | |
|         guivm_windows_prefix = vm.features.get('guivm-windows-prefix', 'GuiVM')
 | |
|         if vm.features.get('service.guivm-gui-agent', None):
 | |
|             vm.untrusted_qdb.write('/guivm-windows-prefix',
 | |
|                                    guivm_windows_prefix)
 | |
| 
 | |
|     @qubes.ext.handler('property-set:default_guivm', system=True)
 | |
|     def on_property_set_default_guivm(self, app, event, name, newvalue,
 | |
|                                       oldvalue=None):
 | |
|         for vm in app.domains:
 | |
|             if hasattr(vm, 'guivm') and vm.property_is_default('guivm'):
 | |
|                 vm.fire_event('property-set:guivm',
 | |
|                               name='guivm', newvalue=newvalue,
 | |
|                               oldvalue=oldvalue)
 | |
| 
 | |
|     @qubes.ext.handler('domain-start')
 | |
|     @asyncio.coroutine
 | |
|     def on_domain_start(self, vm, event, **kwargs):
 | |
|         attached_vms = [domain for domain in self.attached_vms(vm) if
 | |
|                         domain.is_running()]
 | |
|         for attached_vm in attached_vms:
 | |
|             attached_vm.untrusted_qdb.write('/qubes-gui-domain-xid',
 | |
|                                             str(vm.xid))
 | |
|         if vm.features.get('input-dom0-proxy', None):
 | |
|             yield from asyncio.create_subprocess_exec(
 | |
|                 '/usr/bin/qubes-input-trigger --all --dom0')
 | |
| 
 | |
|     @qubes.ext.handler('property-reset:keyboard_layout')
 | |
|     def on_keyboard_reset(self, vm, event, name, oldvalue=None):
 | |
|         if not vm.is_running():
 | |
|             return
 | |
|         kbd_layout = vm.keyboard_layout
 | |
| 
 | |
|         vm.untrusted_qdb.write('/keyboard-layout', kbd_layout)
 | |
| 
 | |
|     @qubes.ext.handler('property-set:keyboard_layout')
 | |
|     def on_keyboard_set(self, vm, event, name, newvalue, oldvalue=None):
 | |
|         for domain in vm.app.domains:
 | |
|             if getattr(domain, 'guivm', None) == vm and \
 | |
|                     domain.property_is_default('keyboard_layout'):
 | |
|                 domain.fire_event('property-reset:keyboard_layout',
 | |
|                                   name='keyboard_layout', oldvalue=oldvalue)
 | |
| 
 | |
|         if vm.is_running():
 | |
|             vm.untrusted_qdb.write('/keyboard-layout', newvalue)
 | 
