mirror of
https://github.com/Rudd-O/ansible-qubes.git
synced 2025-03-01 14:22:33 +01:00
Compare commits
55 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
033d86035c | ||
![]() |
d1af78c00b | ||
![]() |
6014c6f190 | ||
![]() |
037e5af9bd | ||
![]() |
84b7c6b0eb | ||
![]() |
3b1ae61238 | ||
![]() |
c85b35867d | ||
![]() |
782c557cb6 | ||
![]() |
f6dc498036 | ||
![]() |
50b3deddd2 | ||
![]() |
8675eaa547 | ||
![]() |
3a60f0ee4b | ||
![]() |
f750054efa | ||
![]() |
45cd87d984 | ||
![]() |
feff9f41a7 | ||
![]() |
f1db77fb05 | ||
![]() |
e5aef5be64 | ||
![]() |
77015a49ac | ||
![]() |
9043a3a736 | ||
![]() |
8ad65b7e27 | ||
![]() |
a41aa775d2 | ||
![]() |
6984a541c6 | ||
![]() |
a6384ab40f | ||
![]() |
bbed07547c | ||
![]() |
6ae2ae87c0 | ||
![]() |
c4029694fb | ||
![]() |
9a592548e2 | ||
![]() |
aa712c35e0 | ||
![]() |
6eba5edf1f | ||
![]() |
e3d1084c92 | ||
![]() |
17303a9f92 | ||
![]() |
ce843d49f7 | ||
![]() |
8a850692f8 | ||
![]() |
2b8f4e3a90 | ||
![]() |
4966b9e814 | ||
![]() |
0604255e7e | ||
![]() |
a89647c462 | ||
![]() |
3f242216cc | ||
![]() |
759e37b796 | ||
![]() |
cd0df3cccf | ||
![]() |
9871f0aeec | ||
![]() |
6918df4f62 | ||
![]() |
7d56bc1225 | ||
![]() |
3ad3761f2f | ||
![]() |
a55d7cd4d0 | ||
![]() |
5bbbe2f791 | ||
![]() |
920805a8fd | ||
![]() |
f84379bb33 | ||
![]() |
78e00bba3a | ||
![]() |
d480886f7a | ||
![]() |
167a82bac8 | ||
![]() |
f6c623e5db | ||
![]() |
259224c7f7 | ||
![]() |
b9f3eca4d9 | ||
![]() |
03fc7da7de |
14
README.md
14
README.md
@ -89,21 +89,21 @@ Enabling bombshell-client access to dom0
|
||||
----------------------------------------
|
||||
|
||||
`dom0` needs its `qubes.VMShell` service activated. As `root` in `dom0`,
|
||||
create a file `/etc/qubes-rpc/qubes.VMshell` with mode `0644` and make
|
||||
create a file `/etc/qubes-rpc/qubes.VMshell` with mode `0755` and make
|
||||
sure its contents say `/bin/bash`.
|
||||
|
||||
You will then create a file `/etc/qubes-rpc/policy/qubes.VMShell` with
|
||||
mode 0664, owned by your login user, and group `qubes`. Add a policy
|
||||
You will then create a file `/etc/qubes/policy.d/80-ansible-qubes.policy`
|
||||
with mode 0664, owned by `root` and group `qubes`. Add a policy
|
||||
line towards the top of the file:
|
||||
|
||||
```
|
||||
yourvm dom0 ask
|
||||
qubes.VMShell * controller * allow
|
||||
```
|
||||
|
||||
Where `yourvm` represents the name of the VM you will be executing
|
||||
`bombshell-client` against dom0 from.
|
||||
Where `controller` represents the name of the VM you will be executing
|
||||
`bombshell-client` against `dom0` from.
|
||||
|
||||
That's it -- `bombshell-client` should work against dom0 now. Of course,
|
||||
That's it -- `bombshell-client` should work against `dom0` now. Of course,
|
||||
you can adjust the policy to have it not ask — do the security math
|
||||
on what that implies.
|
||||
|
||||
|
@ -96,6 +96,8 @@ def inject_qubes(inject):
|
||||
pass
|
||||
elif vmtype == "ProxyVM":
|
||||
add(flags, "proxy")
|
||||
elif vmtype == "DispVM":
|
||||
pass
|
||||
elif vmtype == "TemplateVM":
|
||||
try:
|
||||
qubes["source"] = qubes["template"]
|
||||
|
@ -8,15 +8,24 @@ from ansible.plugins.action.template import ActionModule as template
|
||||
sys.path.insert(0, os.path.dirname(__file__))
|
||||
import commonlib
|
||||
|
||||
|
||||
contents = """{{ vms | to_nice_yaml }}"""
|
||||
topcontents = "{{ saltenv }}:\n '*':\n - {{ recipename }}\n"
|
||||
|
||||
|
||||
def generate_datastructure(vms, task_vars):
|
||||
dc = collections.OrderedDict
|
||||
d = dc()
|
||||
for n, data in vms.items():
|
||||
# This block will skip any VMs that are not in the groups defined in the 'formation_vm_groups' variable
|
||||
# This allows you to deploy in multiple stages which is useful in cases
|
||||
# where you want to create a template after another template is already provisioned.
|
||||
if 'formation_vm_groups' in task_vars:
|
||||
continueLoop = True
|
||||
for group in task_vars['formation_vm_groups']:
|
||||
if n in task_vars['hostvars'][n]['groups'][group]:
|
||||
continueLoop = False
|
||||
if continueLoop:
|
||||
continue
|
||||
|
||||
qubes = data['qubes']
|
||||
d[task_vars['hostvars'][n]['inventory_hostname_short']] = dc(qvm=['vm'])
|
||||
vm = d[task_vars['hostvars'][n]['inventory_hostname_short']]
|
||||
@ -90,7 +99,6 @@ def generate_datastructure(vms, task_vars):
|
||||
|
||||
return d
|
||||
|
||||
|
||||
class ActionModule(template):
|
||||
|
||||
TRANSFERS_FILES = True
|
||||
@ -99,7 +107,7 @@ class ActionModule(template):
|
||||
qubesdata = commonlib.inject_qubes(task_vars)
|
||||
task_vars["vms"] = generate_datastructure(qubesdata, task_vars)
|
||||
with tempfile.NamedTemporaryFile() as x:
|
||||
x.write(contents)
|
||||
x.write(contents.encode())
|
||||
x.flush()
|
||||
self._task.args['src'] = x.name
|
||||
retval = template.run(self, tmp, task_vars)
|
||||
@ -107,7 +115,7 @@ class ActionModule(template):
|
||||
return retval
|
||||
|
||||
with tempfile.NamedTemporaryFile() as y:
|
||||
y.write(topcontents)
|
||||
y.write(topcontents.encode())
|
||||
y.flush()
|
||||
|
||||
# Create new tmp path -- the other was blown away.
|
||||
|
@ -3,7 +3,7 @@
|
||||
%define mybuildnumber %{?build_number}%{?!build_number:1}
|
||||
|
||||
Name: ansible-qubes
|
||||
Version: 0.0.8
|
||||
Version: 0.0.21
|
||||
Release: %{mybuildnumber}%{?dist}
|
||||
Summary: Inter-VM program execution for Qubes OS AppVMs and StandaloneVMs
|
||||
BuildArch: noarch
|
||||
|
@ -2,17 +2,19 @@
|
||||
|
||||
import base64
|
||||
import pickle
|
||||
import contextlib
|
||||
import ctypes
|
||||
import ctypes.util
|
||||
import errno
|
||||
import fcntl
|
||||
import os
|
||||
import pipes
|
||||
|
||||
try:
|
||||
import queue
|
||||
from shlex import quote
|
||||
except ImportError:
|
||||
import Queue as queue
|
||||
from pipes import quote # noqa
|
||||
|
||||
try:
|
||||
from queue import Queue
|
||||
except ImportError:
|
||||
from Queue import Queue # noqa
|
||||
import select
|
||||
import signal
|
||||
import struct
|
||||
@ -29,16 +31,15 @@ PACKLEN = 8
|
||||
PACKFORMAT = "!HbIx"
|
||||
|
||||
|
||||
@contextlib.contextmanager
|
||||
def mutexfile(filepath):
|
||||
oldumask = os.umask(0o077)
|
||||
try:
|
||||
f = open(filepath, "a")
|
||||
finally:
|
||||
os.umask(oldumask)
|
||||
fcntl.lockf(f.fileno(), fcntl.LOCK_EX)
|
||||
yield
|
||||
f.close()
|
||||
def set_proc_name(newname):
|
||||
from ctypes import cdll, byref, create_string_buffer
|
||||
|
||||
if isinstance(newname, str):
|
||||
newname = newname.encode("utf-8")
|
||||
libc = cdll.LoadLibrary("libc.so.6")
|
||||
buff = create_string_buffer(len(newname) + 1)
|
||||
buff.value = newname
|
||||
libc.prctl(15, byref(buff), 0, 0, 0)
|
||||
|
||||
|
||||
def unset_cloexec(fd):
|
||||
@ -67,18 +68,24 @@ def openfdforread(fd):
|
||||
debug_lock = threading.Lock()
|
||||
debug_enabled = False
|
||||
_startt = time.time()
|
||||
class LoggingEmu():
|
||||
|
||||
|
||||
class LoggingEmu:
|
||||
def __init__(self, prefix):
|
||||
self.prefix = prefix
|
||||
syslog.openlog("bombshell-client.%s" % self.prefix)
|
||||
|
||||
def debug(self, *a, **kw):
|
||||
if not debug_enabled:
|
||||
return
|
||||
self._print(syslog.LOG_DEBUG, *a, **kw)
|
||||
|
||||
def info(self, *a, **kw):
|
||||
self._print(syslog.LOG_INFO, *a, **kw)
|
||||
|
||||
def error(self, *a, **kw):
|
||||
self._print(syslog.LOG_ERR, *a, **kw)
|
||||
|
||||
def _print(self, prio, *a, **kw):
|
||||
debug_lock.acquire()
|
||||
global _startt
|
||||
@ -88,20 +95,31 @@ class LoggingEmu():
|
||||
string = a[0]
|
||||
else:
|
||||
string = a[0] % a[1:]
|
||||
syslog.syslog(prio, ("%.3f " % deltat) + threading.currentThread().getName() + ": " + string)
|
||||
n = threading.current_thread().name
|
||||
syslog.syslog(
|
||||
prio,
|
||||
("%.3f " % deltat) + n + ": " + string,
|
||||
)
|
||||
finally:
|
||||
debug_lock.release()
|
||||
|
||||
|
||||
logging = None
|
||||
|
||||
|
||||
def send_confirmation(chan, retval, errmsg):
|
||||
chan.write(struct.pack("!H", retval))
|
||||
l = len(errmsg)
|
||||
assert l < 1<<32
|
||||
chan.write(struct.pack("!I", l))
|
||||
ln = len(errmsg)
|
||||
assert ln < 1 << 32
|
||||
chan.write(struct.pack("!I", ln))
|
||||
chan.write(errmsg)
|
||||
chan.flush()
|
||||
logging.debug("Sent confirmation on channel %s: %s %s", chan, retval, errmsg)
|
||||
logging.debug(
|
||||
"Sent confirmation on channel %s: %s %s",
|
||||
chan,
|
||||
retval,
|
||||
errmsg,
|
||||
)
|
||||
|
||||
|
||||
def recv_confirmation(chan):
|
||||
@ -114,34 +132,33 @@ def recv_confirmation(chan):
|
||||
return r, errmsg
|
||||
assert len(r) == 2, r
|
||||
r = struct.unpack("!H", r)[0]
|
||||
l = chan.read(4)
|
||||
assert len(l) == 4, l
|
||||
l = struct.unpack("!I", l)[0]
|
||||
errmsg = chan.read(l)
|
||||
lc = chan.read(4)
|
||||
assert len(lc) == 4, lc
|
||||
lu = struct.unpack("!I", lc)[0]
|
||||
errmsg = chan.read(lu)
|
||||
logging.debug("Received confirmation: %s %s", r, errmsg)
|
||||
return r, errmsg
|
||||
|
||||
|
||||
class MyThread(threading.Thread):
|
||||
|
||||
def run(self):
|
||||
try:
|
||||
self._run()
|
||||
except Exception as e:
|
||||
logging.error("%s: unexpected exception", threading.currentThread())
|
||||
except Exception:
|
||||
n = threading.current_thread().name
|
||||
logging.error("%s: unexpected exception", n)
|
||||
tb = traceback.format_exc()
|
||||
logging.error("%s: traceback: %s", threading.currentThread(), tb)
|
||||
logging.error("%s: exiting program", threading.currentThread())
|
||||
logging.error("%s: traceback: %s", n, tb)
|
||||
logging.error("%s: exiting program", n)
|
||||
os._exit(124)
|
||||
|
||||
|
||||
class SignalSender(MyThread):
|
||||
|
||||
def __init__(self, signals, sigqueue):
|
||||
"""Handles signals by pushing them into a file-like object."""
|
||||
threading.Thread.__init__(self)
|
||||
self.setDaemon(True)
|
||||
self.queue = queue.Queue()
|
||||
self.daemon = True
|
||||
self.queue = Queue()
|
||||
self.sigqueue = sigqueue
|
||||
for sig in signals:
|
||||
signal.signal(sig, self.copy)
|
||||
@ -163,11 +180,10 @@ class SignalSender(MyThread):
|
||||
|
||||
|
||||
class Signaler(MyThread):
|
||||
|
||||
def __init__(self, process, sigqueue):
|
||||
"""Reads integers from a file-like object and relays that as kill()."""
|
||||
threading.Thread.__init__(self)
|
||||
self.setDaemon(True)
|
||||
self.daemon = True
|
||||
self.process = process
|
||||
self.sigqueue = sigqueue
|
||||
|
||||
@ -179,17 +195,26 @@ class Signaler(MyThread):
|
||||
break
|
||||
assert len(data) == 2
|
||||
signum = struct.unpack("!H", data)[0]
|
||||
logging.debug("Received relayed signal %s, sending to process %s", signum, self.process.pid)
|
||||
logging.debug(
|
||||
"Received relayed signal %s, sending to process %s",
|
||||
signum,
|
||||
self.process.pid,
|
||||
)
|
||||
try:
|
||||
self.process.send_signal(signum)
|
||||
except BaseException as e:
|
||||
logging.error("Failed to relay signal %s to process %s: %s", signum, self.process.pid, e)
|
||||
logging.error(
|
||||
"Failed to relay signal %s to process %s: %s",
|
||||
signum,
|
||||
self.process.pid,
|
||||
e,
|
||||
)
|
||||
logging.debug("End of signaler")
|
||||
|
||||
|
||||
def write(dst, buffer, l):
|
||||
def write(dst, buffer, ln):
|
||||
alreadywritten = 0
|
||||
mv = memoryview(buffer)[:l]
|
||||
mv = memoryview(buffer)[:ln]
|
||||
while len(mv):
|
||||
dst.write(mv)
|
||||
writtenthisloop = len(mv)
|
||||
@ -199,10 +224,10 @@ def write(dst, buffer, l):
|
||||
alreadywritten = alreadywritten + writtenthisloop
|
||||
|
||||
|
||||
def copy(src, dst, buffer, l):
|
||||
def copy(src, dst, buffer, ln):
|
||||
alreadyread = 0
|
||||
mv = memoryview(buffer)[:l]
|
||||
assert len(mv) == l, "Buffer object is too small: %s %s" % (len(mv), l)
|
||||
mv = memoryview(buffer)[:ln]
|
||||
assert len(mv) == ln, "Buffer object is too small: %s %s" % (len(mv), ln)
|
||||
while len(mv):
|
||||
_, _, _ = select.select([src], (), ())
|
||||
readthisloop = src.readinto(mv)
|
||||
@ -210,77 +235,104 @@ def copy(src, dst, buffer, l):
|
||||
raise Exception("copy: Failed to read any bytes")
|
||||
mv = mv[readthisloop:]
|
||||
alreadyread = alreadyread + readthisloop
|
||||
return write(dst, buffer, l)
|
||||
return write(dst, buffer, ln)
|
||||
|
||||
|
||||
class DataMultiplexer(MyThread):
|
||||
|
||||
def __init__(self, sources, sink):
|
||||
threading.Thread.__init__(self)
|
||||
self.setDaemon(True)
|
||||
self.daemon = True
|
||||
self.sources = dict((s, num) for num, s in enumerate(sources))
|
||||
self.sink = sink
|
||||
|
||||
def _run(self):
|
||||
logging.debug("mux: Started with sources %s and sink %s", self.sources, self.sink)
|
||||
logging.debug(
|
||||
"mux: Started with sources %s and sink %s", self.sources, self.sink
|
||||
)
|
||||
buffer = bytearray(MAX_MUX_READ)
|
||||
while self.sources:
|
||||
sources, _, x = select.select((s for s in self.sources), (), (s for s in self.sources))
|
||||
sources, _, x = select.select(
|
||||
(s for s in self.sources), (), (s for s in self.sources)
|
||||
)
|
||||
assert not x, x
|
||||
for s in sources:
|
||||
n = self.sources[s]
|
||||
logging.debug("mux: Source %s (%s) is active", n, s)
|
||||
readthisloop = s.readinto(buffer)
|
||||
if readthisloop == 0:
|
||||
logging.debug("mux: Received no bytes from source %s, signaling peer to close corresponding source", n)
|
||||
logging.debug(
|
||||
"mux: Received no bytes from source %s, signaling"
|
||||
" peer to close corresponding source",
|
||||
n,
|
||||
)
|
||||
del self.sources[s]
|
||||
header = struct.pack(PACKFORMAT, n, False, 0)
|
||||
self.sink.write(header)
|
||||
continue
|
||||
l = readthisloop
|
||||
header = struct.pack(PACKFORMAT, n, True, l)
|
||||
ln = readthisloop
|
||||
header = struct.pack(PACKFORMAT, n, True, ln)
|
||||
self.sink.write(header)
|
||||
write(self.sink, buffer, l)
|
||||
write(self.sink, buffer, ln)
|
||||
logging.debug("mux: End of data multiplexer")
|
||||
|
||||
|
||||
class DataDemultiplexer(MyThread):
|
||||
|
||||
def __init__(self, source, sinks):
|
||||
threading.Thread.__init__(self)
|
||||
self.setDaemon(True)
|
||||
self.daemon = True
|
||||
self.sinks = dict(enumerate(sinks))
|
||||
self.source = source
|
||||
|
||||
def _run(self):
|
||||
logging.debug("demux: Started with source %s and sinks %s", self.source, self.sinks)
|
||||
logging.debug(
|
||||
"demux: Started with source %s and sinks %s",
|
||||
self.source,
|
||||
self.sinks,
|
||||
)
|
||||
buffer = bytearray(MAX_MUX_READ)
|
||||
while self.sinks:
|
||||
r, _, x = select.select([self.source], (), [self.source])
|
||||
assert not x, x
|
||||
for s in r:
|
||||
header = s.read(PACKLEN)
|
||||
if header == "":
|
||||
logging.debug("demux: Received no bytes from source, closing all sinks")
|
||||
if header == b"":
|
||||
logging.debug(
|
||||
"demux: Received no bytes from source, closing sinks",
|
||||
)
|
||||
for sink in self.sinks.values():
|
||||
sink.close()
|
||||
self.sinks = []
|
||||
break
|
||||
n, active, l = struct.unpack(PACKFORMAT, header)
|
||||
n, active, ln = struct.unpack(PACKFORMAT, header)
|
||||
if not active:
|
||||
logging.debug("demux: Source %s now inactive, closing corresponding sink %s", s, self.sinks[n])
|
||||
logging.debug(
|
||||
"demux: Source %s inactive, closing matching sink %s",
|
||||
s,
|
||||
self.sinks[n],
|
||||
)
|
||||
self.sinks[n].close()
|
||||
del self.sinks[n]
|
||||
else:
|
||||
copy(self.source, self.sinks[n], buffer, l)
|
||||
copy(self.source, self.sinks[n], buffer, ln)
|
||||
logging.debug("demux: End of data demultiplexer")
|
||||
|
||||
|
||||
def quotedargs():
|
||||
return " ".join(quote(x) for x in sys.argv[1:])
|
||||
|
||||
|
||||
def quotedargs_ellipsized(cmdlist):
|
||||
text = " ".join(quote(x) for x in cmdlist)
|
||||
if len(text) > 80:
|
||||
text = text[:77] + "..."
|
||||
return text
|
||||
|
||||
def main_master():
|
||||
set_proc_name("bombshell-client (master) %s" % quotedargs())
|
||||
global logging
|
||||
logging = LoggingEmu("master")
|
||||
|
||||
logging.info("Started with arguments: %s", sys.argv[1:])
|
||||
logging.info("Started with arguments: %s", quotedargs_ellipsized(sys.argv[1:]))
|
||||
|
||||
global debug_enabled
|
||||
args = sys.argv[1:]
|
||||
@ -293,20 +345,24 @@ def main_master():
|
||||
assert remote_command
|
||||
|
||||
def anypython(exe):
|
||||
return "` test -x %s && echo %s || echo python`" % (pipes.quote(exe),
|
||||
pipes.quote(exe))
|
||||
return "` test -x %s && echo %s || echo python3`" % (
|
||||
quote(exe),
|
||||
quote(exe),
|
||||
)
|
||||
|
||||
remote_helper_text = b"exec "
|
||||
remote_helper_text += bytes(anypython(sys.executable), "utf-8")
|
||||
remote_helper_text += bytes(" -u -c ", "utf-8")
|
||||
remote_helper_text += bytes(pipes.quote(open(__file__, "r").read()), "ascii")
|
||||
remote_helper_text += bytes(
|
||||
quote(open(__file__, "r").read()),
|
||||
"ascii",
|
||||
)
|
||||
remote_helper_text += b" -d " if debug_enabled else b" "
|
||||
remote_helper_text += base64.b64encode(pickle.dumps(remote_command, 2))
|
||||
remote_helper_text += b"\n"
|
||||
|
||||
saved_stderr = openfdforappend(os.dup(sys.stderr.fileno()))
|
||||
|
||||
with mutexfile(os.path.expanduser("~/.bombshell-lock")):
|
||||
try:
|
||||
p = subprocess.Popen(
|
||||
["qrexec-client-vm", remote_vm, "qubes.VMShell"],
|
||||
@ -341,15 +397,15 @@ def main_master():
|
||||
)
|
||||
read_signals, write_signals = pairofpipes()
|
||||
signaler = SignalSender(handled_signals, write_signals)
|
||||
signaler.setName("master signaler")
|
||||
signaler.name = "master signaler"
|
||||
signaler.start()
|
||||
|
||||
muxer = DataMultiplexer([sys.stdin, read_signals], p.stdin)
|
||||
muxer.setName("master multiplexer")
|
||||
muxer.name = "master multiplexer"
|
||||
muxer.start()
|
||||
|
||||
demuxer = DataDemultiplexer(p.stdout, [sys.stdout, saved_stderr])
|
||||
demuxer.setName("master demultiplexer")
|
||||
demuxer.name = "master demultiplexer"
|
||||
demuxer.start()
|
||||
|
||||
retval = p.wait()
|
||||
@ -365,10 +421,11 @@ def pairofpipes():
|
||||
|
||||
|
||||
def main_remote():
|
||||
set_proc_name("bombshell-client (remote) %s" % quotedargs())
|
||||
global logging
|
||||
logging = LoggingEmu("remote")
|
||||
|
||||
logging.info("Started with arguments: %s", sys.argv[1:])
|
||||
logging.info("Started with arguments: %s", quotedargs_ellipsized(sys.argv[1:]))
|
||||
|
||||
global debug_enabled
|
||||
if "-d" in sys.argv[1:]:
|
||||
@ -380,7 +437,7 @@ def main_remote():
|
||||
cmd = pickle.loads(base64.b64decode(cmd))
|
||||
logging.debug("Received command: %s", cmd)
|
||||
|
||||
nicecmd = " ".join(pipes.quote(a) for a in cmd)
|
||||
nicecmd = " ".join(quote(a) for a in cmd)
|
||||
try:
|
||||
p = subprocess.Popen(
|
||||
cmd,
|
||||
@ -406,21 +463,22 @@ def main_remote():
|
||||
signals_read, signals_written = pairofpipes()
|
||||
|
||||
signaler = Signaler(p, signals_read)
|
||||
signaler.setName("remote signaler")
|
||||
signaler.name = "remote signaler"
|
||||
signaler.start()
|
||||
|
||||
demuxer = DataDemultiplexer(sys.stdin, [p.stdin, signals_written])
|
||||
demuxer.setName("remote demultiplexer")
|
||||
demuxer.name = "remote demultiplexer"
|
||||
demuxer.start()
|
||||
|
||||
muxer = DataMultiplexer([p.stdout, p.stderr], sys.stdout)
|
||||
muxer.setName("remote multiplexer")
|
||||
muxer.name = "remote multiplexer"
|
||||
muxer.start()
|
||||
|
||||
logging.info("Started %s", nicecmd)
|
||||
nicecmd_ellipsized = quotedargs_ellipsized(cmd)
|
||||
logging.info("Started %s", nicecmd_ellipsized)
|
||||
|
||||
retval = p.wait()
|
||||
logging.info("Return code %s for %s", retval, nicecmd)
|
||||
logging.info("Return code %s for %s", retval, nicecmd_ellipsized)
|
||||
muxer.join()
|
||||
logging.info("Ending bombshell")
|
||||
return retval
|
||||
|
@ -1 +1 @@
|
||||
["RELEASE": "25 32 34 35"]
|
||||
["RELEASE": "q4.2 38 39"]
|
||||
|
@ -63,14 +63,20 @@ class x(object):
|
||||
display = x()
|
||||
|
||||
|
||||
BUFSIZE = 128*1024 # any bigger and it causes issues because we don't read multiple chunks until completion
|
||||
BUFSIZE = 64*1024 # any bigger and it causes issues because we don't read multiple chunks until completion
|
||||
CONNECTION_TRANSPORT = "qubes"
|
||||
CONNECTION_OPTIONS = {
|
||||
'management_proxy': '--management-proxy',
|
||||
}
|
||||
|
||||
|
||||
def debug(text):
|
||||
return
|
||||
print(text, file=sys.stderr)
|
||||
|
||||
|
||||
def encode_exception(exc, stream):
|
||||
debug("encoding exception")
|
||||
stream.write('{}\n'.format(len(exc.__class__.__name__)).encode('ascii'))
|
||||
stream.write('{}'.format(exc.__class__.__name__).encode('ascii'))
|
||||
for attr in "errno", "filename", "message", "strerror":
|
||||
@ -79,6 +85,7 @@ def encode_exception(exc, stream):
|
||||
|
||||
|
||||
def decode_exception(stream):
|
||||
debug("decoding exception")
|
||||
name_len = stream.readline(16)
|
||||
name_len = int(name_len)
|
||||
name = stream.read(name_len)
|
||||
@ -107,6 +114,7 @@ def decode_exception(stream):
|
||||
|
||||
|
||||
def popen(cmd, in_data, outf=sys.stdout):
|
||||
debug("popening on remote %s" % type(in_data))
|
||||
try:
|
||||
p = subprocess.Popen(
|
||||
cmd, shell=False, stdin=subprocess.PIPE,
|
||||
@ -124,9 +132,11 @@ def popen(cmd, in_data, outf=sys.stdout):
|
||||
outf.write('{}\n'.format(len(err)).encode('ascii'))
|
||||
outf.write(err)
|
||||
outf.flush()
|
||||
debug("finished popening")
|
||||
|
||||
|
||||
def put(out_path):
|
||||
debug("dest writing %s" % out_path)
|
||||
try:
|
||||
f = open(out_path, "wb")
|
||||
sys.stdout.write(b'Y\n')
|
||||
@ -136,18 +146,25 @@ def put(out_path):
|
||||
return
|
||||
while True:
|
||||
chunksize = int(sys.stdin.readline(16))
|
||||
if chunksize == 0:
|
||||
if not chunksize:
|
||||
debug("looks like we have no more to read")
|
||||
break
|
||||
while chunksize:
|
||||
debug(type(chunksize))
|
||||
chunk = sys.stdin.read(chunksize)
|
||||
assert len(chunk) == chunksize, ("Mismatch in chunk length", len(chunk), chunksize)
|
||||
assert chunk
|
||||
debug("dest writing %s" % len(chunk))
|
||||
try:
|
||||
f.write(chunk)
|
||||
sys.stdout.write(b'Y\n')
|
||||
except (IOError, OSError) as e:
|
||||
sys.stdout.write(b'N\n')
|
||||
encode_exception(e, sys.stdout)
|
||||
f.close()
|
||||
return
|
||||
chunksize = chunksize - len(chunk)
|
||||
debug("remaining %s" % chunksize)
|
||||
sys.stdout.write(b'Y\n')
|
||||
sys.stdout.flush()
|
||||
try:
|
||||
f.flush()
|
||||
except (IOError, OSError) as e:
|
||||
@ -155,10 +172,12 @@ def put(out_path):
|
||||
encode_exception(e, sys.stdout)
|
||||
return
|
||||
finally:
|
||||
debug("finished writing dest")
|
||||
f.close()
|
||||
|
||||
|
||||
def fetch(in_path, bufsize):
|
||||
debug("Fetching from remote %s" % in_path)
|
||||
try:
|
||||
f = open(in_path, "rb")
|
||||
except (IOError, OSError) as e:
|
||||
@ -206,7 +225,7 @@ sys.stdout = sys.stdout.buffer if hasattr(sys.stdout, 'buffer') else sys.stdout
|
||||
'''
|
||||
payload = b'\n\n'.join(
|
||||
inspect.getsource(x).encode("utf-8")
|
||||
for x in (encode_exception, popen, put, fetch)
|
||||
for x in (debug, encode_exception, popen, put, fetch)
|
||||
) + \
|
||||
b'''
|
||||
|
||||
@ -255,7 +274,7 @@ class Connection(ConnectionBase):
|
||||
def set_options(self, task_keys=None, var_options=None, direct=None):
|
||||
super(Connection, self).set_options(task_keys=task_keys, var_options=var_options, direct=direct)
|
||||
# FIXME HORRIBLE WORKAROUND FIXME
|
||||
if task_keys['delegate_to'] and 'management_proxy' in self._options:
|
||||
if task_keys and task_keys['delegate_to'] and self._options and 'management_proxy' in self._options:
|
||||
self._options['management_proxy'] = ''
|
||||
|
||||
def __init__(self, play_context, new_stdin, *args, **kwargs):
|
||||
@ -266,7 +285,6 @@ class Connection(ConnectionBase):
|
||||
self.transport_cmd = kwargs['transport_cmd']
|
||||
return
|
||||
self.transport_cmd = distutils.spawn.find_executable('qrun')
|
||||
self.transport_cmd = None
|
||||
if not self.transport_cmd:
|
||||
self.transport_cmd = os.path.join(
|
||||
os.path.dirname(__file__),
|
||||
@ -295,7 +313,7 @@ class Connection(ConnectionBase):
|
||||
if not self._connected:
|
||||
remote_cmd = [to_bytes(x, errors='surrogate_or_strict') for x in [
|
||||
# 'strace', '-s', '2048', '-o', '/tmp/log',
|
||||
'python', '-u', '-i', '-c', preamble
|
||||
'python3', '-u', '-i', '-c', preamble
|
||||
]]
|
||||
addr = self._play_context.remote_addr
|
||||
proxy = to_bytes(self.get_option("management_proxy")) if self.get_option("management_proxy") else ""
|
||||
@ -357,16 +375,18 @@ class Connection(ConnectionBase):
|
||||
cmd = shlex.split(cmd)
|
||||
display.vvvv("EXEC %s" % cmd, host=self._play_context.remote_addr)
|
||||
try:
|
||||
payload = ('popen(%r, %r)\n' % (cmd, in_data)).encode("utf-8")
|
||||
payload = ('popen(%r, %r)\n\n' % (cmd, in_data)).encode("utf-8")
|
||||
self._transport.stdin.write(payload)
|
||||
self._transport.stdin.flush()
|
||||
yesno = self._transport.stdout.readline(2)
|
||||
debug("Reading yesno")
|
||||
except Exception:
|
||||
self._abort_transport()
|
||||
raise
|
||||
if yesno == "Y\n" or yesno == b"Y\n":
|
||||
try:
|
||||
retcode = self._transport.stdout.readline(16)
|
||||
debug("Reading retcode")
|
||||
try:
|
||||
retcode = int(retcode)
|
||||
except Exception:
|
||||
@ -403,6 +423,7 @@ class Connection(ConnectionBase):
|
||||
else:
|
||||
self._abort_transport()
|
||||
raise errors.AnsibleError("pass/fail from remote end is unexpected: %r" % yesno)
|
||||
debug("finished popening on master")
|
||||
|
||||
def put_file(self, in_path, out_path):
|
||||
'''Transfer a file from local to VM.'''
|
||||
@ -424,6 +445,7 @@ class Connection(ConnectionBase):
|
||||
with open(in_path, 'rb') as in_file:
|
||||
while True:
|
||||
chunk = in_file.read(BUFSIZE)
|
||||
debug("source writing %s bytes" % len(chunk))
|
||||
try:
|
||||
self._transport.stdin.write(("%s\n" % len(chunk)).encode("utf-8"))
|
||||
self._transport.stdin.flush()
|
||||
@ -443,9 +465,15 @@ class Connection(ConnectionBase):
|
||||
else:
|
||||
self._abort_transport()
|
||||
raise errors.AnsibleError("pass/fail from remote end is unexpected: %r" % yesno)
|
||||
debug("on this side it's all good")
|
||||
|
||||
self._transport.stdin.write(("%s\n" % 0).encode("utf-8"))
|
||||
self._transport.stdin.flush()
|
||||
debug("finished writing source")
|
||||
|
||||
def fetch_file(self, in_path, out_path):
|
||||
'''Fetch a file from VM to local.'''
|
||||
debug("fetching to local")
|
||||
super(Connection, self).fetch_file(in_path, out_path)
|
||||
display.vvvv("FETCH %s to %s" % (in_path, out_path), host=self._play_context.remote_addr)
|
||||
in_path = _prefix_login_path(in_path)
|
||||
|
@ -24,13 +24,13 @@ Integrate this software into your Ansible setup (within your `managevm`) VM) by:
|
||||
|
||||
## Set up the policy file for `qubes.VMShell`
|
||||
|
||||
Edit (as `root`) the file `/etc/qubes-rpc/policy/qubes.VMShell`
|
||||
Edit (as `root`) the file `/etc/qubes/policy.d/80-ansible-qubes.policy`
|
||||
located on the file system of your `dom0`.
|
||||
|
||||
At the top of the file, add the following two lines:
|
||||
|
||||
```
|
||||
managevm $anyvm allow
|
||||
qubes.VMShell * managevm * allow
|
||||
```
|
||||
|
||||
This first line lets `managevm` execute any commands on any VM on your
|
||||
@ -41,25 +41,21 @@ security prompt to allow `qubes.VMShell` on the target VM you're managing.
|
||||
|
||||
Now save that file, and exit your editor.
|
||||
|
||||
If your dom0 has a file `/etc/qubes-rpc/policy/qubes.VMShell`,
|
||||
you can delete it now. It is obsolete.
|
||||
|
||||
### Optional: allow `managevm` to manage `dom0`
|
||||
|
||||
Before the line you added in the previous step, add this line:
|
||||
|
||||
```
|
||||
managevm dom0 allow
|
||||
```
|
||||
|
||||
This line lets `managevm` execute any commands in `dom0`. Be sure you
|
||||
understand the security implications of such a thing.
|
||||
|
||||
The next step is to add the RPC service proper. Edit the file
|
||||
The next step is to add the RPC service proper to dom0. Edit the file
|
||||
`/etc/qubes-rpc/qubes.VMShell` to have a single line that contains:
|
||||
|
||||
```
|
||||
exec bash
|
||||
```
|
||||
|
||||
That is it. `dom0` should work now.
|
||||
Make the file executable.
|
||||
|
||||
That is it. `dom0` should work now. Note you do this at your own risk.
|
||||
|
||||
|
||||
## Test `qrun` works
|
||||
|
@ -13,11 +13,11 @@ to set up a policy that allows us to remotely execute commands on any VM of the
|
||||
network server, without having to be physically present to click any dialogs authorizing
|
||||
the execution of those commands.
|
||||
|
||||
In `dom0` of your Qubes server, edit `/etc/qubes-rpc/policy/qubes.VMShell` to add,
|
||||
In `dom0` of your Qubes server, edit `/etc/qubes/policy.d/80-ansible-qubes.policy` to add,
|
||||
at the top of the file, a policy that looks like this:
|
||||
|
||||
```
|
||||
exp-manager $anyvm allow
|
||||
qubes.VMShell * managevm * allow
|
||||
```
|
||||
|
||||
This tells Qubes OS that `exp-manager` is now authorized to run any command in any of the VMs.
|
||||
@ -25,13 +25,13 @@ This tells Qubes OS that `exp-manager` is now authorized to run any command in a
|
||||
**Security note**: this does mean that anyone with access to `exp-manager` can do
|
||||
literally anything on any of your VMs in your Qubes OS server.
|
||||
|
||||
If that is not what you want, then replace `$anyvm` with the name of the VMs you would like
|
||||
to manage. For example: if you would like `exp-manager` to be authorized to run commands
|
||||
*only* on `exp-net`, then you can use the following policy:
|
||||
If that is not what you want, then replace `*` after `managevm` with the name of the VMs you
|
||||
would like to manage. For example: if you would like `exp-manager` to be authorized to run
|
||||
commands *only* on `exp-net`, then you can use the following policy:
|
||||
|
||||
```
|
||||
exp-manager exp-net allow
|
||||
exp-manager $anyvm deny
|
||||
qubes.VMShell * exp-manager exp-net allow
|
||||
qubes.VMShell * exp-manager @anyvm deny
|
||||
```
|
||||
|
||||
Try it out now. SSH from your manager machine into `exp-manager` and run:
|
||||
@ -47,7 +47,7 @@ You should see `yes` followed by `exp-net` on the output side.
|
||||
If you expect that you will need to run commands in `dom0` from your manager machine
|
||||
(say, to create, stop, start and modify VMs in the Qubes OS server),
|
||||
then you will have to create a file `/etc/qubes-rpc/qubes.VMShell` as `root` in `dom0`,
|
||||
with the contents `/bin/bash` and permission mode `0644`. Doing this will enable you
|
||||
with the contents `/bin/bash` and permission mode `0755`. Doing this will enable you
|
||||
to run commands on `dom0` which you can subsequently test in `exp-manager` by running command:
|
||||
|
||||
```
|
||||
@ -57,7 +57,7 @@ qvm-run dom0 'echo yes ; hostname'
|
||||
like you did before.
|
||||
|
||||
**Security note**: this does mean that anyone with access to `exp-manager` can do
|
||||
literally anything on your Qubes OS server.
|
||||
*literally anything* on your Qubes OS server. You have been warned.
|
||||
|
||||
## Integrate your Ansible setup
|
||||
|
||||
|
30
lookup_plugins/jq.py
Normal file
30
lookup_plugins/jq.py
Normal file
@ -0,0 +1,30 @@
|
||||
from ansible.errors import AnsibleError
|
||||
from ansible.plugins.lookup import LookupBase
|
||||
|
||||
import json
|
||||
import sys
|
||||
import subprocess
|
||||
|
||||
try:
|
||||
from __main__ import display
|
||||
except ImportError:
|
||||
from ansible.utils.display import Display
|
||||
display = Display()
|
||||
|
||||
|
||||
UNDEFINED = object()
|
||||
|
||||
|
||||
class LookupModule(LookupBase):
|
||||
|
||||
def run(self, args, variables):
|
||||
i = json.dumps(args[0])
|
||||
c = ["jq", args[1]]
|
||||
p = subprocess.Popen(c, stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
|
||||
o, e = p.communicate(i)
|
||||
r = p.wait()
|
||||
if r != 0 or e:
|
||||
assert 0, e
|
||||
raise subprocess.CalledProcessError(r, c, o, e)
|
||||
r = json.loads(o)
|
||||
return r
|
Loading…
x
Reference in New Issue
Block a user