internal.py 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. # -*- encoding: utf-8 -*-
  2. #
  3. # The Qubes OS Project, http://www.qubes-os.org
  4. #
  5. # Copyright (C) 2017 Marek Marczykowski-Górecki
  6. # <marmarek@invisiblethingslab.com>
  7. #
  8. # This library is free software; you can redistribute it and/or
  9. # modify it under the terms of the GNU Lesser General Public
  10. # License as published by the Free Software Foundation; either
  11. # version 2.1 of the License, or (at your option) any later version.
  12. #
  13. # This library is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  16. # Lesser General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU Lesser General Public
  19. # License along with this library; if not, see <https://www.gnu.org/licenses/>.
  20. ''' Internal interface for dom0 components to communicate with qubesd. '''
  21. import asyncio
  22. import json
  23. import subprocess
  24. import qubes.api
  25. import qubes.api.admin
  26. import qubes.vm.adminvm
  27. import qubes.vm.dispvm
  28. class QubesInternalAPI(qubes.api.AbstractQubesAPI):
  29. ''' Communication interface for dom0 components,
  30. by design the input here is trusted.'''
  31. SOCKNAME = '/var/run/qubesd.internal.sock'
  32. @qubes.api.method('internal.GetSystemInfo', no_payload=True)
  33. @asyncio.coroutine
  34. def getsysteminfo(self):
  35. self.enforce(self.dest.name == 'dom0')
  36. self.enforce(not self.arg)
  37. system_info = {'domains': {
  38. domain.name: {
  39. 'tags': list(domain.tags),
  40. 'type': domain.__class__.__name__,
  41. 'template_for_dispvms':
  42. getattr(domain, 'template_for_dispvms', False),
  43. 'default_dispvm': (str(domain.default_dispvm) if
  44. getattr(domain, 'default_dispvm', None) else None),
  45. 'icon': str(domain.label.icon),
  46. } for domain in self.app.domains
  47. }}
  48. return json.dumps(system_info)
  49. @qubes.api.method('internal.vm.volume.ImportBegin',
  50. scope='local', write=True)
  51. @asyncio.coroutine
  52. def vm_volume_import(self, untrusted_payload):
  53. """Begin importing volume data. Payload is either size of new data
  54. in bytes, or empty. If empty, the current volume's size will be used.
  55. Returns size and path to where data should be written.
  56. Triggered by scripts in /etc/qubes-rpc:
  57. admin.vm.volume.Import, admin.vm.volume.ImportWithSize.
  58. When the script finish importing, it will trigger
  59. internal.vm.volume.ImportEnd (with either b'ok' or b'fail' as a
  60. payload) and response from that call will be actually send to the
  61. caller.
  62. """
  63. self.enforce(self.arg in self.dest.volumes.keys())
  64. if untrusted_payload:
  65. original_method = 'admin.vm.volume.ImportWithSize'
  66. else:
  67. original_method = 'admin.vm.volume.Import'
  68. self.src.fire_event(
  69. 'admin-permission:' + original_method,
  70. pre_event=True, dest=self.dest, arg=self.arg)
  71. if not self.dest.is_halted():
  72. raise qubes.exc.QubesVMNotHaltedError(self.dest)
  73. requested_size = None
  74. if untrusted_payload:
  75. try:
  76. untrusted_value = int(untrusted_payload.decode('ascii'))
  77. except (UnicodeDecodeError, ValueError):
  78. raise qubes.api.ProtocolError('Invalid value')
  79. self.enforce(untrusted_value > 0)
  80. requested_size = untrusted_value
  81. del untrusted_value
  82. del untrusted_payload
  83. path = yield from self.dest.storage.import_data(
  84. self.arg, requested_size)
  85. self.enforce(' ' not in path)
  86. if requested_size is None:
  87. size = self.dest.volumes[self.arg].size
  88. else:
  89. size = requested_size
  90. # when we know the action is allowed, inform extensions that it will
  91. # be performed
  92. self.dest.fire_event(
  93. 'domain-volume-import-begin', volume=self.arg, size=size)
  94. return '{} {}'.format(size, path)
  95. @qubes.api.method('internal.vm.volume.ImportEnd')
  96. @asyncio.coroutine
  97. def vm_volume_import_end(self, untrusted_payload):
  98. '''
  99. This is second half of admin.vm.volume.Import handling. It is called
  100. when actual import is finished. Response from this method is sent do
  101. the client (as a response for admin.vm.volume.Import call).
  102. The payload is either 'ok', or 'fail\n<error message>'.
  103. '''
  104. self.enforce(self.arg in self.dest.volumes.keys())
  105. success = untrusted_payload == b'ok'
  106. try:
  107. yield from self.dest.storage.import_data_end(self.arg,
  108. success=success)
  109. except:
  110. self.dest.fire_event('domain-volume-import-end', volume=self.arg,
  111. success=False)
  112. raise
  113. self.dest.fire_event('domain-volume-import-end', volume=self.arg,
  114. success=success)
  115. if not success:
  116. error = ''
  117. parts = untrusted_payload.decode('ascii').split('\n', 1)
  118. if len(parts) > 1:
  119. error = parts[1]
  120. raise qubes.exc.QubesException(
  121. 'Data import failed: {}'.format(error))
  122. @qubes.api.method('internal.SuspendPre', no_payload=True)
  123. @asyncio.coroutine
  124. def suspend_pre(self):
  125. '''
  126. Method called before host system goes to sleep.
  127. :return:
  128. '''
  129. # first notify all VMs
  130. processes = []
  131. for vm in self.app.domains:
  132. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  133. continue
  134. if not vm.is_running():
  135. continue
  136. if not vm.features.check_with_template('qrexec', False):
  137. continue
  138. try:
  139. proc = yield from vm.run_service(
  140. 'qubes.SuspendPreAll', user='root',
  141. stdin=subprocess.DEVNULL,
  142. stdout=subprocess.DEVNULL,
  143. stderr=subprocess.DEVNULL)
  144. processes.append(proc)
  145. except qubes.exc.QubesException as e:
  146. vm.log.warning('Failed to run qubes.SuspendPreAll: %s', str(e))
  147. # FIXME: some timeout?
  148. if processes:
  149. yield from asyncio.wait([p.wait() for p in processes])
  150. coros = []
  151. # then suspend/pause VMs
  152. for vm in self.app.domains:
  153. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  154. continue
  155. if vm.is_running():
  156. coros.append(vm.suspend())
  157. if coros:
  158. yield from asyncio.wait(coros)
  159. @qubes.api.method('internal.SuspendPost', no_payload=True)
  160. @asyncio.coroutine
  161. def suspend_post(self):
  162. '''
  163. Method called after host system wake up from sleep.
  164. :return:
  165. '''
  166. coros = []
  167. # first resume/unpause VMs
  168. for vm in self.app.domains:
  169. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  170. continue
  171. if vm.get_power_state() in ["Paused", "Suspended"]:
  172. coros.append(vm.resume())
  173. if coros:
  174. yield from asyncio.wait(coros)
  175. # then notify all VMs
  176. processes = []
  177. for vm in self.app.domains:
  178. if isinstance(vm, qubes.vm.adminvm.AdminVM):
  179. continue
  180. if not vm.is_running():
  181. continue
  182. if not vm.features.check_with_template('qrexec', False):
  183. continue
  184. try:
  185. proc = yield from vm.run_service(
  186. 'qubes.SuspendPostAll', user='root',
  187. stdin=subprocess.DEVNULL,
  188. stdout=subprocess.DEVNULL,
  189. stderr=subprocess.DEVNULL)
  190. processes.append(proc)
  191. except qubes.exc.QubesException as e:
  192. vm.log.warning('Failed to run qubes.SuspendPostAll: %s', str(e))
  193. # FIXME: some timeout?
  194. if processes:
  195. yield from asyncio.wait([p.wait() for p in processes])