2 Created on Nov 19, 2013
8 from subprocess import Popen, PIPE, call, STARTUPINFO, _subprocess
12 from cygwin import Cygwin
13 from environment import Environment
21 from opensecurity_util import logger, setupLogger, OpenSecurityException
31 class VMManagerException(Exception):
32 def __init__(self, value):
35 return repr(self.value)
42 def __init__(self, vendorid, productid, revision):
43 self.vendorid = vendorid.lower()
44 self.productid = productid.lower()
45 self.revision = revision.lower()
48 def __eq__(self, other):
49 return self.vendorid == other.vendorid and self.productid == other.productid and self.revision == other.revision
52 return hash(self.vendorid) ^ hash(self.productid) ^ hash(self.revision)
55 return "VendorId = \'" + str(self.vendorid) + "\' ProductId = \'" + str(self.productid) + "\' Revision = \'" + str(self.revision) + "\'"
57 #def __getitem__(self, item):
58 # return self.coords[item]
60 class VMManager(object):
61 vmRootName = "SecurityDVM"
62 systemProperties = None
66 browsingManager = None
67 status_message = 'Starting up...'
72 self.systemProperties = self.getSystemProperties()
73 self.machineFolder = self.systemProperties["Default machine folder"]
75 # only proceed if we have a working background environment
78 self.rsdHandler = DeviceHandler(self)
79 self.rsdHandler.start()
80 self.browsingManager = BrowsingManager(self)
81 self.browsingManager.start()
83 logger.critical(self.status_message)
88 if VMManager._instance == None:
89 VMManager._instance = VMManager()
90 return VMManager._instance
95 """check if the backend (VirtualBox) is sufficient for our task"""
97 # ensure we have our system props
98 if self.systemProperties == None:
99 self.systemProperties = self.getSystemProperties()
100 if self.systemProperties == None:
101 self.status_message = 'Failed to get backend system properties. Is Backend (VirtualBox?) installed?'
104 # check for existing Extension pack
105 if not 'Remote desktop ExtPack' in self.systemProperties:
106 self.status_message = 'No remote desktop extension pack found. Please install the "Oracle VM VirtualBox Extension Pack" from https://www.virtualbox.org/wiki/Downloads.'
108 if self.systemProperties['Remote desktop ExtPack'] == 'Oracle VM VirtualBox Extension Pack ':
109 self.status_message = 'Unsure if suitable extension pack is installed. Please install the "Oracle VM VirtualBox Extension Pack" from https://www.virtualbox.org/wiki/Downloads.'
112 # check if we do have our root VMs installed
114 if not self.vmRootName in vms:
115 self.status_message = 'Unable to locate root SecurityDVM. Please download and setup the initial image.'
118 # basically all seems nice and ready to rumble
119 self.status_message = 'All is ok.'
125 if self.rsdHandler != None:
126 self.rsdHandler.stop()
127 self.rsdHandler.join()
128 drives = self.getNetworkDrives()
129 for drive in drives.keys():
130 result = urllib2.urlopen('http://127.0.0.1:8090/netumount?'+'drive_letter='+drive).readline()
132 for vm in self.listSDVM():
136 # return hosty system properties
137 def getSystemProperties(self):
138 result = Cygwin.checkResult(Cygwin.vboxExecute('list systemproperties'))
141 props = dict((k.strip(),v.strip().strip('"')) for k,v in (line.split(':', 1) for line in result[1].strip().splitlines()))
144 # return the folder containing the guest VMs
145 def getMachineFolder(self):
146 return self.machineFolder
148 # list all existing VMs registered with VBox
150 result = Cygwin.checkResult(Cygwin.vboxExecute('list vms'))[1]
151 vms = list(k.strip().strip('"') for k,_ in (line.split(' ') for line in result.splitlines()))
155 def listRunningVMS(self):
156 result = Cygwin.checkResult(Cygwin.vboxExecute('list runningvms'))[1]
157 vms = list(k.strip().strip('"') for k,_ in (line.split(' ') for line in result.splitlines()))
160 # list existing SDVMs
165 if vm.startswith(self.vmRootName) and vm != self.vmRootName:
169 # generate valid (not already existing SDVM name). necessary for creating a new VM
170 def generateSDVMName(self):
172 for i in range(0,999):
173 if(not self.vmRootName+str(i) in vms):
174 return self.vmRootName+str(i)
177 # check if the device is mass storage type
179 def isMassStorageDevice(device):
180 keyname = 'SYSTEM\CurrentControlSet\Enum\USB' + '\VID_' + device.vendorid+'&'+'PID_'+ device.productid
181 key = win32api.RegOpenKey(win32con.HKEY_LOCAL_MACHINE, keyname)
182 #subkeys = _winreg.QueryInfoKey(key)[0]
183 #for i in range(0, subkeys):
184 # print _winreg.EnumKey(key, i)
185 devinfokeyname = win32api.RegEnumKey(key, 0)
186 win32api.RegCloseKey(key)
188 devinfokey = win32api.RegOpenKey(win32con.HKEY_LOCAL_MACHINE, keyname+'\\'+devinfokeyname)
189 value = win32api.RegQueryValueEx(devinfokey, 'SERVICE')[0]
190 win32api.RegCloseKey(devinfokey)
192 return 'USBSTOR' in value
194 # return the RSDs connected to the host
196 def getConnectedRSDS():
197 results = Cygwin.checkResult(Cygwin.vboxExecute('list usbhost'))[1]
198 results = results.split('Host USB Devices:')[1].strip()
200 items = list( "UUID:"+result for result in results.split('UUID:') if result != '')
204 for line in item.splitlines():
206 k,v = line[:line.index(':')].strip(), line[line.index(':')+1:].strip()
209 #if 'Product' in props.keys() and props['Product'] == 'Mass Storage':
211 usb_filter = USBFilter( re.search(r"\((?P<vid>[0-9A-Fa-f]+)\)", props['VendorId']).groupdict()['vid'],
212 re.search(r"\((?P<pid>[0-9A-Fa-f]+)\)", props['ProductId']).groupdict()['pid'],
213 re.search(r"\((?P<rev>[0-9A-Fa-f]+)\)", props['Revision']).groupdict()['rev'] )
214 if VMManager.isMassStorageDevice(usb_filter):
215 rsds[props['UUID']] = usb_filter;
216 logger.debug(usb_filter)
219 # return the RSDs attached to all existing SDVMs
220 def getAttachedRSDs(self):
221 vms = self.listSDVM()
222 attached_devices = dict()
224 rsd_filter = self.getUSBFilter(vm)
225 if rsd_filter != None:
226 attached_devices[vm] = rsd_filter
227 return attached_devices
229 # configures hostonly networking and DHCP server. requires admin rights
230 def configureHostNetworking(self):
231 #cmd = 'vboxmanage list hostonlyifs'
232 #Cygwin.vboxExecute(cmd)
233 #cmd = 'vboxmanage hostonlyif remove \"VirtualBox Host-Only Ethernet Adapter\"'
234 #Cygwin.vboxExecute(cmd)
235 #cmd = 'vboxmanage hostonlyif create'
236 #Cygwin.vboxExecute(cmd)
237 Cygwin.checkResult(Cygwin.vboxExecute('hostonlyif ipconfig \"VirtualBox Host-Only Ethernet Adapter\" --ip 192.168.56.1 --netmask 255.255.255.0'))
238 #cmd = 'vboxmanage dhcpserver add'
239 #Cygwin.vboxExecute(cmd)
240 Cygwin.checkResult(Cygwin.vboxExecute('dhcpserver modify --ifname \"VirtualBox Host-Only Ethernet Adapter\" --ip 192.168.56.100 --netmask 255.255.255.0 --lowerip 192.168.56.101 --upperip 192.168.56.200'))
242 def isSDVMExisting(self, vm_name):
243 sdvms = self.listSDVM()
244 return vm_name in sdvms
246 #create new virtual machine instance based on template vm named SecurityDVM (\SecurityDVM\SecurityDVM.vmdk)
247 def createVM(self, vm_name):
248 if self.isSDVMExisting(vm_name):
250 #remove eventually existing SDVM folder
251 machineFolder = Cygwin.cygPath(self.machineFolder)
252 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/rm -rf \\\"' + machineFolder + '/' + vm_name + '\\\"'))
253 hostonly_if = self.getHostOnlyIFs()
254 Cygwin.checkResult(Cygwin.vboxExecute('createvm --name ' + vm_name + ' --ostype Debian --register'))
255 Cygwin.checkResult(Cygwin.vboxExecute('modifyvm ' + vm_name + ' --memory 512 --vram 10 --cpus 1 --usb on --usbehci on --nic1 hostonly --hostonlyadapter1 \"' + hostonly_if['Name'] + '\" --nic2 nat'))
256 Cygwin.checkResult(Cygwin.vboxExecute('storagectl ' + vm_name + ' --name SATA --add sata --portcount 2'))
259 # attach storage image to controller
260 def storageAttach(self, vm_name):
261 if self.isStorageAttached(vm_name):
262 self.storageDetach(vm_name)
263 Cygwin.checkResult(Cygwin.vboxExecute('storageattach ' + vm_name + ' --storagectl SATA --port 0 --device 0 --type hdd --medium \"'+ self.machineFolder + '\SecurityDVM\SecurityDVM.vmdk\"'))
265 # return true if storage is attached
266 def isStorageAttached(self, vm_name):
267 info = self.getVMInfo(vm_name)
268 return (info['SATA-0-0']!='none')
270 # detach storage from controller
271 def storageDetach(self, vm_name):
272 if self.isStorageAttached(vm_name):
273 Cygwin.checkResult(Cygwin.vboxExecute('storageattach ' + vm_name + ' --storagectl SATA --port 0 --device 0 --type hdd --medium none'))
275 def changeStorageType(self, filename, storage_type):
276 Cygwin.checkResult(Cygwin.vboxExecute('modifyhd \"' + filename + '\" --type ' + storage_type))
278 # list storage snaphots for VM
279 def updateTemplate(self):
282 self.poweroffVM('SecurityDVM')
283 self.waitShutdown('SecurityDVM')
286 self.genCertificateISO('SecurityDVM')
287 self.attachCertificateISO('SecurityDVM')
289 self.storageDetach('SecurityDVM')
290 results = Cygwin.checkResult(Cygwin.vboxExecute('list hdds'))[1]
291 results = results.replace('Parent UUID', 'Parent')
292 items = list( "UUID:"+result for result in results.split('UUID:') if result != '')
297 for line in item.splitlines():
299 k,v = line[:line.index(':')].strip(), line[line.index(':')+1:].strip()
301 snaps[props['UUID']] = props
304 template_storage = self.machineFolder + '\SecurityDVM\SecurityDVM.vmdk'
308 for hdd in snaps.values():
309 if hdd['Location'] == template_storage:
310 template_uuid = hdd['UUID']
311 logger.debug('found parent uuid ' + template_uuid)
314 for hdd in snaps.values():
315 if hdd['Parent'] == template_uuid:
316 #template_uuid = hdd['UUID']
317 logger.debug('removing snapshot ' + hdd['UUID'])
318 Cygwin.checkResult(Cygwin.vboxExecute('closemedium disk {' + hdd['UUID'] + '} --delete'))#[1]
319 # parse result 0%...10%...20%...30%...40%...50%...60%...70%...80%...90%...100%
321 self.changeStorageType(template_storage,'normal')
322 self.storageAttach('SecurityDVM')
323 self.startVM('SecurityDVM')
324 self.waitStartup('SecurityDVM')
325 Cygwin.checkResult(Cygwin.sshExecute('"sudo apt-get -y update"', VMManager.getHostOnlyIP('SecurityDVM'), 'osecuser', Cygwin.cygPath(self.machineFolder) + '/' + 'SecurityDVM' + '/dvm_key'))
326 Cygwin.checkResult(Cygwin.sshExecute('"sudo apt-get -y upgrade"', VMManager.getHostOnlyIP('SecurityDVM'), 'osecuser', Cygwin.cygPath(self.machineFolder) + '/' + 'SecurityDVM' + '/dvm_key'))
327 #self.stopVM('SecurityDVM')
328 self.hibernateVM('SecurityDVM')
329 self.waitShutdown('SecurityDVM')
330 self.storageDetach('SecurityDVM')
331 self.changeStorageType(template_storage,'immutable')
332 self.storageAttach('SecurityDVM')
333 self.rsdHandler = DeviceHandler(self)
334 self.rsdHandler.start()
336 #remove VM from the system. should be used on VMs returned by listSDVMs
337 def removeVM(self, vm_name):
338 logger.info('Removing ' + vm_name)
339 Cygwin.checkResult(Cygwin.vboxExecute('unregistervm ' + vm_name + ' --delete'))
340 machineFolder = Cygwin.cygPath(self.machineFolder)
341 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/rm -rf \\\"' + machineFolder + '/' + vm_name + '\\\"'))
344 def startVM(self, vm_name):
345 logger.info('Starting ' + vm_name)
346 result = Cygwin.checkResult(Cygwin.vboxExecute('startvm ' + vm_name + ' --type headless' ))
347 while 'successfully started' not in result[1]:
348 logger.error("Failed to start SDVM: " + vm_name + " retrying")
349 logger.error("Command returned:\n" + result[2])
351 result = Cygwin.checkResult(Cygwin.vboxExecute('startvm ' + vm_name + ' --type headless'))
354 # return wether VM is running or not
355 def isVMRunning(self, vm_name):
356 return vm_name in self.listRunningVMS()
359 def stopVM(self, vm_name):
360 logger.info('Sending shutdown signal to ' + vm_name)
361 Cygwin.checkResult(Cygwin.sshExecute( '"sudo shutdown -h now"', VMManager.getHostOnlyIP(vm_name), 'osecuser', Cygwin.cygPath(self.machineFolder) + '/' + vm_name + '/dvm_key' ))
364 def hibernateVM(self, vm_name):
365 logger.info('Sending hibernate-disk signal to ' + vm_name)
366 Cygwin.checkResult(Cygwin.sshExecute( '"sudo hibernate-disk&"', VMManager.getHostOnlyIP(vm_name), 'osecuser', Cygwin.cygPath(self.machineFolder) + '/' + vm_name + '/dvm_key', wait_return=False))
369 def poweroffVM(self, vm_name):
370 if not self.isVMRunning(vm_name):
372 logger.info('Powering off ' + vm_name)
373 return Cygwin.checkResult(Cygwin.vboxExecute('controlvm ' + vm_name + ' poweroff'))
375 #list the hostonly IFs exposed by the VBox host
377 def getHostOnlyIFs():
378 result = Cygwin.vboxExecute('list hostonlyifs')[1]
381 props = dict((k.strip(),v.strip().strip('"')) for k,v in (line.split(':', 1) for line in result.strip().splitlines()))
384 # return the hostOnly IP for a running guest or the host
386 def getHostOnlyIP(vm_name):
388 logger.info('Getting hostOnly IP address for Host')
389 return VMManager.getHostOnlyIFs()['IPAddress']
391 logger.info('Getting hostOnly IP address ' + vm_name)
392 result = Cygwin.checkResult(Cygwin.vboxExecute('guestproperty get ' + vm_name + ' /VirtualBox/GuestInfo/Net/0/V4/IP'))
396 if result.startswith('No value set!'):
398 return result[result.index(':')+1:].strip()
400 # attach removable storage device to VM by provision of filter
401 def attachRSD(self, vm_name, rsd_filter):
402 return Cygwin.checkResult(Cygwin.vboxExecute('usbfilter add 0 --target ' + vm_name + ' --name OpenSecurityRSD --vendorid ' + rsd_filter.vendorid + ' --productid ' + rsd_filter.productid + ' --revision ' + rsd_filter.revision))
404 # detach removable storage from VM by
405 def detachRSD(self, vm_name):
406 return Cygwin.checkResult(Cygwin.vboxExecute('usbfilter remove 0 --target ' + vm_name))
408 # return the description set for an existing VM
409 def getVMInfo(self, vm_name):
410 results = Cygwin.checkResult(Cygwin.vboxExecute('showvminfo ' + vm_name + ' --machinereadable'))[1]
411 props = dict((k.strip().strip('"'),v.strip().strip('"')) for k,v in (line.split('=', 1) for line in results.splitlines()))
414 # return the configured USB filter for an existing VM
415 def getUSBFilter(self, vm_name):
416 props = self.getVMInfo(vm_name)
417 keys = set(['USBFilterVendorId1', 'USBFilterProductId1', 'USBFilterRevision1'])
418 keyset = set(props.keys())
420 if keyset.issuperset(keys):
421 usb_filter = USBFilter(props['USBFilterVendorId1'], props['USBFilterProductId1'], props['USBFilterRevision1'])
424 #generates ISO containing authorized_keys for use with guest VM
425 def genCertificateISO(self, vm_name):
426 machineFolder = Cygwin.cygPath(self.machineFolder)
427 # remove .ssh folder if exists
428 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/rm -rf \\\"' + machineFolder + '/' + vm_name + '/.ssh\\\"'))
429 # remove .ssh folder if exists
430 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/rm -rf \\\"' + machineFolder + '/' + vm_name + '/dvm_key\\\"'))
431 # create .ssh folder in vm_name
432 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/mkdir -p \\\"' + machineFolder + '/' + vm_name + '/.ssh\\\"'))
433 # generate dvm_key pair in vm_name / .ssh
434 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/ssh-keygen -q -t rsa -N \\\"\\\" -C \\\"' + vm_name + '\\\" -f \\\"' + machineFolder + '/' + vm_name + '/.ssh/dvm_key\\\"'))
435 # move out private key
436 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/mv \\\"' + machineFolder + '/' + vm_name + '/.ssh/dvm_key\\\" \\\"' + machineFolder + '/' + vm_name + '\\\"'))
437 # set permissions for private key
438 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/chmod 500 \\\"' + machineFolder + '/' + vm_name + '/dvm_key\\\"'))
439 # rename public key to authorized_keys
440 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/mv \\\"' + machineFolder + '/' + vm_name + '/.ssh/dvm_key.pub\\\" \\\"' + machineFolder + '/' + vm_name + '/.ssh/authorized_keys\\\"'))
441 # set permissions for authorized_keys
442 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/chmod 500 \\\"' + machineFolder + '/' + vm_name + '/.ssh/authorized_keys\\\"'))
443 # generate iso image with .ssh/authorized keys
444 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/genisoimage -J -R -o \\\"' + machineFolder + '/' + vm_name + '/'+ vm_name + '.iso\\\" \\\"' + machineFolder + '/' + vm_name + '/.ssh\\\"'))
446 # attaches generated ssh public cert to guest vm
447 def attachCertificateISO(self, vm_name):
448 result = Cygwin.checkResult(Cygwin.vboxExecute('storageattach ' + vm_name + ' --storagectl SATA --port 1 --device 0 --type dvddrive --mtype readonly --medium \"' + self.machineFolder + '\\' + vm_name + '\\'+ vm_name + '.iso\"'))
451 # wait for machine to come up
452 def waitStartup(self, vm_name, timeout_ms = 30000):
453 Cygwin.checkResult(Cygwin.vboxExecute('guestproperty wait ' + vm_name + ' SDVMStarted --timeout ' + str(timeout_ms) + ' --fail-on-timeout'))
454 return VMManager.getHostOnlyIP(vm_name)
456 # wait for machine to shutdown
457 def waitShutdown(self, vm_name):
458 while vm_name in self.listRunningVMS():
462 #Small function to check if the mentioned location is a directory
463 def isDirectory(self, path):
464 result = Cygwin.checkResult(Cygwin.cmdExecute('dir ' + path + ' | FIND ".."'))
465 return string.find(result[1], 'DIR',)
467 def getNetworkDrives(self):
468 ip = VMManager.getHostOnlyIP(None)
469 ip = ip[:ip.rindex('.')]
471 result = Cygwin.checkResult(Cygwin.execute('C:\\Windows\\system32\\net.exe', 'USE'))
472 for line in result[1].splitlines():
475 drives[parts[1]] = parts[2]
478 def genNetworkDrive(self):
479 network_drives = self.getNetworkDrives()
480 logical_drives = VMManager.getLogicalDrives()
481 drives = list(map(chr, range(68, 91)))
483 if drive+':' not in network_drives and drive not in logical_drives:
486 def getNetworkDrive(self, vm_name):
487 ip = self.getHostOnlyIP(vm_name)
488 result = Cygwin.checkResult(Cygwin.execute('C:\\Windows\\system32\\net.exe', 'USE'))
489 for line in result[1].splitlines():
490 if line != None and ip in line:
495 def getLogicalDrives():
496 drive_bitmask = ctypes.cdll.kernel32.GetLogicalDrives()
497 return list(itertools.compress(string.ascii_uppercase, map(lambda x:ord(x) - ord('0'), bin(drive_bitmask)[:1:-1])))
500 def getDriveType(drive):
501 return ctypes.cdll.kernel32.GetDriveTypeW(u"%s:\\"%drive)
504 def getVolumeInfo(drive):
505 volumeNameBuffer = ctypes.create_unicode_buffer(1024)
506 fileSystemNameBuffer = ctypes.create_unicode_buffer(1024)
508 max_component_length = None
509 file_system_flags = None
511 rc = ctypes.cdll.kernel32.GetVolumeInformationW(
512 #ctypes.c_wchar_p("F:\\"),
515 ctypes.sizeof(volumeNameBuffer),
517 max_component_length,
519 fileSystemNameBuffer,
520 ctypes.sizeof(fileSystemNameBuffer)
523 return volumeNameBuffer.value, fileSystemNameBuffer.value
525 # handles browsing request
526 def handleBrowsingRequest(self):
527 handler = BrowsingHandler(self)
531 def getActiveUserName(self):
532 key = win32api.RegOpenKey(win32con.HKEY_LOCAL_MACHINE, 'SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI')
533 v = str(win32api.RegQueryValueEx(key, 'LastLoggedOnUser')[0])
534 win32api.RegCloseKey(key)
535 user_name = win32api.ExpandEnvironmentStrings(v)
538 def getUserSID(self, user_name):
539 account_name = win32security.LookupAccountName(None, user_name)
540 sid = win32security.ConvertSidToStringSid(account_name[0])
543 def getAppDataDir(self, sid):
544 key = win32api.RegOpenKey(win32con.HKEY_USERS, sid + '\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders')
545 value, type = win32api.RegQueryValueEx(key, "AppData")
546 win32api.RegCloseKey(key)
549 #key = win32api.RegOpenKey(win32con.HKEY_LOCAL_MACHINE, 'SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList' + '\\' + sid)
550 #value, type = win32api.RegQueryValueEx(key, "ProfileImagePath")
553 def backupFile(self, src, dest):
554 certificate = Cygwin.cygPath(self.getMachineFolder()) + '/' + self.browsingManager.vm_name + '/dvm_key'
555 command = '-r -o StrictHostKeyChecking=no -i "' + certificate + '" "osecuser@' + self.browsingManager.ip_addr + ':' + src + '" "' + dest + '"'
556 return Cygwin.execute(Cygwin.cygwin_scp, command, wait_return=True, window=False)
558 def restoreFile(self, src, dest):
559 certificate = Cygwin.cygPath(self.getMachineFolder()) + '/' + self.browsingManager.vm_name + '/dvm_key'
560 #command = '-r -v -o StrictHostKeyChecking=no -i \"' + certificate + '\" \"' + src + '\" \"osecuser@' + self.browsingManager.ip_addr + ':' + dest + '\"'
561 command = '-r -o StrictHostKeyChecking=no -i "' + certificate + '" "' + src + '" "osecuser@' + self.browsingManager.ip_addr + ':' + dest + '"'
562 return Cygwin.execute(Cygwin.cygwin_scp, command, wait_return=True, window=False)
565 #handles browsing session creation
566 class BrowsingHandler(threading.Thread):
568 def __init__(self, vmmanager):
569 threading.Thread.__init__(self)
573 browser = '\\\"/usr/bin/chromium; pidof dbus-launch | xargs kill\\\"'
574 if Cygwin.is_X11_running()==False:
577 self.vmm.browsingManager.started.wait()
578 result = Cygwin.checkResult(Cygwin.sshExecuteX11(browser, self.vmm.browsingManager.ip_addr, 'osecuser', Cygwin.cygPath(self.vmm.getMachineFolder()) + '/' + self.vmm.browsingManager.vm_name + '/dvm_key'))
579 #backup settings on vm
581 logger.error("BrowsingHandler closing. Cleaning up")
582 self.vmm.backupFile('/home/osecuser/.config/chromium', self.vmm.browsingManager.appDataDir + '/OpenSecurity/')
583 self.vmm.browsingManager.restart.set()
586 # handles browsing Vm creation and destruction
587 class BrowsingManager(threading.Thread):
596 def __init__(self, vmmanager):
597 threading.Thread.__init__(self)
599 self.restart = threading.Event()
600 self.started = threading.Event()
607 if self.drive != None:
608 browsing_vm = urllib2.urlopen('http://127.0.0.1:8090/netumount?'+'drive_letter='+self.drive).readline()
613 if self.vm_name != None:
614 self.vmm.poweroffVM(self.vm_name)
615 self.vmm.removeVM(self.vm_name)
618 self.vm_name = self.vmm.generateSDVMName()
619 self.vmm.createVM(self.vm_name)
620 self.vmm.storageAttach(self.vm_name)
621 self.vmm.genCertificateISO(self.vm_name)
622 self.vmm.attachCertificateISO(self.vm_name)
623 self.vmm.startVM(self.vm_name)
624 self.ip_addr = self.vmm.waitStartup(self.vm_name)
625 if self.ip_addr == None:
627 self.drive = self.vmm.genNetworkDrive()
628 if self.drive == None:
631 net_resource = '\\\\' + self.ip_addr + '\\Download'
632 result = urllib2.urlopen('http://127.0.0.1:8090/netmount?'+'drive_letter='+self.drive+'&net_resource='+net_resource).readline()
636 user = self.vmm.getActiveUserName()
637 sid = self.vmm.getUserSID(user)
638 path = self.vmm.getAppDataDir(sid)
639 self.appDataDir = Cygwin.cygPath(path)
640 # create OpenSecurity settings dir on local machine user home /AppData/Roaming
641 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/mkdir -p \\\"' + self.appDataDir + '/OpenSecurity\\\"'))
642 # create chromium settings dir on local machine if not existing
643 Cygwin.checkResult(Cygwin.bashExecute('/usr/bin/mkdir -p \\\"' + self.appDataDir + '/OpenSecurity/chromium\\\"'))
644 # create chromium settings dir on remote machine if not existing
645 Cygwin.checkResult(Cygwin.sshExecute('"mkdir -p \\\"/home/osecuser/.config\\\""', self.ip_addr, 'osecuser', Cygwin.cygPath(self.vmm.getMachineFolder()) + '/' + self.vm_name + '/dvm_key'))
646 #restore settings on vm
647 self.vmm.restoreFile(self.appDataDir + '/OpenSecurity/chromium', '/home/osecuser/.config/')
650 logger.error("BrowsingHandler failed. Cleaning up")
652 class DeviceHandler(threading.Thread):
657 def __init__(self, vmmanger):
658 threading.Thread.__init__(self)
665 self.connectedRSDs = dict()
668 tmp_rsds = self.vmm.getConnectedRSDS()
670 self.attachedRSDs = self.vmm.getAttachedRSDs()
671 for vm_name in self.attachedRSDs.keys():
672 if self.attachedRSDs[vm_name] not in tmp_rsds.values():
673 drive = self.vmm.getNetworkDrive(vm_name)
674 #self.stopVM(vm_name)
675 self.vmm.detachRSD(vm_name)
676 self.vmm.poweroffVM(vm_name)
677 self.vmm.removeVM(vm_name)
679 result = urllib2.urlopen('http://127.0.0.1:8090/netumount?'+'drive_letter='+drive).readline()
683 if tmp_rsds.keys() == self.connectedRSDs.keys():
684 logger.debug("Nothing's changed. sleep(3)")
688 logger.info("Something's changed")
689 self.connectedRSDs = tmp_rsds
691 #create new vm for attached device if any
692 self.attachedRSDs = self.vmm.getAttachedRSDs()
693 self.connectedRSDs = self.vmm.getConnectedRSDS()
696 for connected_device in self.connectedRSDs.values():
697 if (self.attachedRSDs and False) or (connected_device not in self.attachedRSDs.values()):
698 new_sdvm = self.vmm.generateSDVMName()
699 self.vmm.createVM(new_sdvm)
700 self.vmm.storageAttach(new_sdvm)
701 self.vmm.attachRSD(new_sdvm, connected_device)
702 self.vmm.startVM(new_sdvm)
703 new_ip = self.vmm.waitStartup(new_sdvm)
704 drive = self.vmm.genNetworkDrive()
706 net_resource = '\\\\' + new_ip + '\\USB'
707 result = urllib2.urlopen('http://127.0.0.1:8090/netmount?'+'drive_letter='+drive+'&net_resource='+net_resource).readline()
710 if __name__ == '__main__':
711 #man = VMManager.getInstance()
713 #print man.getConnectedRSDs()
714 #print man.getNetworkDrives()
715 #man.genNetworkDrive()
716 #drive_bitmask = ctypes.cdll.kernel32.GetLogicalDrives()
717 #print list(itertools.compress(string.ascii_uppercase, map(lambda x:ord(x) - ord('0'), bin(drive_bitmask)[:1:-1])))
718 #print list(map(chr, range(68, 91)))
719 #print Cygwin.getRegEntry('SYSTEM\CurrentControlSet\Enum\USB', 'VID_1058&PID_0704')[0]
720 #devices = VMManager.getConnectedRSDS()
723 drives = VMManager.getLogicalDrives()
725 print VMManager.getDriveType("E")
726 print VMManager.getVolumeInfo("E")
729 #for device in devices.values():
731 # if VMManager.isMassStorageDevice(device):
741 #man.genCertificateISO('SecurityDVM0')
742 #man.guestExecute('SecurityDVM0', '/bin/ls -la')
743 #logger = setupLogger('VMManager')
746 #man.sshExecute('/bin/ls -la', 'SecurityDVM0')
747 #man.sshExecuteX11('/usr/bin/iceweasel', 'SecurityDVM0')
748 #man.removeVM('SecurityDVM0')
749 #man.netUse('192.168.56.134', 'USB\\')
750 #ip = '192.168.56.139'
752 #man.cygwin_path = 'c:\\cygwin64\\bin\\'
753 #man.handleDeviceChange()
754 #print man.listSDVM()
755 #man.configureHostNetworking()
756 #new_vm = man.generateSDVMName()
757 #man.createVM(new_vm)
760 #man.isAvailable('c:')
761 #ip = man.getHostOnlyIP('SecurityDVM0')
762 #man.mapNetworkDrive('h:', '\\\\' + ip + '\Download', None, None)
764 #man.genCertificateISO(new_vm)
765 #man.attachCertificateISO(new_vm)
767 #man.attachCertificateISO(vm_name)
768 #man.guestExecute(vm_name, "ls")
769 #man.sshGuestX11Execute('SecurityDVM1', '/usr/bin/iceweasel')
771 #print man.cygwinPath("C:\Users\BarthaM\VirtualBox VMs\SecurityDVM\.ssh\*")
772 #man.genCertificateISO('SecurityDVM')
773 #man.attachCertificateISO('SecurityDVM')
774 #man.isStorageAttached('SecurityDVM')
775 #man.guestExecute('SecurityDVM', 'sudo apt-get -y update')
776 #man.guestExecute('SecurityDVM', 'sudo apt-get -y upgrade' )
778 #man.stopVM('SecurityDVM')
779 #man.storageDetach('SecurityDVM')
780 #man.changeStorageType('C:\Users\BarthaM\VirtualBox VMs\SecurityDVM\SecurityDVM.vmdk','immutable')
781 #man.storageAttach('SecurityDVM')
784 #cmd = "c:\\cygwin64\\bin\\bash.exe --login -c \"/bin/ls\""